top of page
Security
While no data transmission over the Internet or information storage technology can be guaranteed to be 100% secure, LendingTree understands your concerns with the safety of your personal information. The following is a summary of the measures Legit Loan Approval takes to protect your information and descriptions of ways we implement these measures for different types of information you may provide to us. Please see the Terms of Use Agreement and Privacy Policy for additional information, definitions and terms that govern this security section.
Secure Web Pages and Encryption
Transmissions between LegitLoanApproval, banks, lenders, loan brokers and real estate professionals (and affiliates) are encrypted using public key cryptography algorithms with a minimum key size of 128 bits.
SSL secures and prevents third parties from intercepting and reading your personal information; only we can decode the encryption. This technology requires a modern web browser such as Chrome, Edge, Firefox, Internet Explorer, Opera or Safari. You can verify that your communications with Legit Loan Approval are secure by checking for the key or lock icon on your browser.
Our website will log you out after a specified period of inactivity. This ensures your account security if you forget to logout from our website.
Firewall Protection
Firewalls are special purpose devices that protect and screen-out malicious attempts to access information and networks. Legit Loan Approval deploys Next Generation Firewalls to protect our resources and consumer data from internal and external threats.
Vulnerability Reporting
Legit Loan Approval recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Legit Loan Approval(or that would reasonably impact the security of Legit Loan Approval and our users) using the web form below. The Legit Loan Approval Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.
IF YOU HAVE A QUESTION OR CONCERN REGARDING YOUR ACCOUNT, PLEASE CONTACT CUSTOMER SERVICE.
Legit Loan Approval Vulnerability Disclosure Policy
Vulnerability Disclosure Philosophy
Legit Loan Approval believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Legit Loan Approval and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Legit Loan Approval customers, products, and services.
Security Researchers
Legit Loan Approval accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Legit Loan Approval defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.
Scope
This policy applies to any digital assets owned, operated, or maintained by LegitLoanApproval, including public facing websites.
Our Commitment to Researchers
Trust. We maintain trust and confidentiality in our professional exchanges with security researchers.
Respect. We treat all researchers with respect and recognize your contribution for keeping our customers safe and secure.
Transparency. We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy.
Common Good. We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.
What We Ask of Researchers
Trust. We request that you communicate about potential vulnerabilities in a responsible manner, providing sufficient time and information for our team to validate and address potential issues.
Respect. We request that researchers make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing.
Transparency. We request that researchers provide the technical details and background necessary for our team to identify and validate reported issues, using the form below.
Common Good. We request that researchers act for the common good, protecting user privacy and security by refraining from publicly disclosing unverified vulnerabilities until our team has had time to validate and address reported issues.
Vulnerability Reporting
Legit Loan Approval recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Legit Loan Approval(or that would reasonably impact the security of Legit Loan Approval and our users) using the web form below. The Legit Loan Approval Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.
Security Policy: About
bottom of page