Does E-Closing Actually Reduce Fraud And Identity Theft?

The federal E-Sign Act (ESA), adopted in 2000, established that electronic signatures are legally valid and enforceable as part of a commercial transaction. The act created a general definition of an electronic signature as, “an electronic sound, symbol, or process attached to or logically associated with a contract or other…

Continue reading

How Hackers Target Real Estate Transactions

Hackers have found far too many ways to wreak havoc on financial transactions in general, and more specifically in real estate transactions. Understanding what vulnerabilities these cybercriminals are exploiting to gain access to confidential information and to trick homebuyers into sending them large sums of money is the first step…

Continue reading

What’s Happening with TRID Under the New Administration?

Now that the mortgage industry is beginning to function more smoothly under TRID (TILA-RESPA Integrated Disclosure Rule, also known as the Know Before You Owe Rule), and with proposed changes to TRID hanging in the balance since October 2016, industry experts are left wondering what will happen next, regarding TRID, under…

Continue reading

Cutting Operation Costs That Can Affect Real Estate Transactions

As  anyone involved in the real estate industry knows, operation costs can easily get out of control, thanks to inefficiency and dealing with disparate, sometimes redundant, systems that are often based on fallible manual document preparation and poor communication. A recent study by Accenture found that the title production process…

Continue reading

Improving Mortgage Industry Cyber Security Through Secure Communications

Improving Mortgage Industry Cyber Security

Cyber Crime, including phishing and hacking are nothing new, but in recent years, the amount of Cyber Crime specifically targeting real estate transactions has skyrocketed. In May 2015, the National Association of Realtors (NAR) issued an alert to its members warning of variations on a fraud scheme in which hackers…

Continue reading