Questions about storing and processing your data in a safe and secure manner

What level of security do you use?

We take our data storage and processing obligations very seriously. For your peace of mind and to keep you safe, all data is securely processed in systems similar to those used by top banking institutions. We use a secure SSL connection. In relation to payment card data, you can be assured that we are fully PCI compliant.


Was this answer useful?   Yes | No

What is your policy on keeping my data?

The way we process, store and dispose of your data is set out in full in our privacy policy, a link to which can be found at the bottom of the page. In summary however, we will keep your data securely stored for as long as legally permitted. We process data in accordance with the General Data Protection Regulation (GDPR).


Was this answer useful?   Yes | No

How do you use cookies?

The way we use cookies is set out in detail in our privacy policy. To read about this, just tap the privacy policy link at the bottom of this page. In general though, cookies are small files which are stored on your device. The aim of the cookie is to hold a small amount of data specific to you and the website you are accessing. The point of cookies is so that the server delivers a web page tailored to you in some way. Alternatively, the page can have some script which recognises the data in the cookie and so is able to transmit data from one visit to the website (or related site) to the next.


Was this answer useful?   Yes | No

I am concerned about giving you my bank details

We require your bank details in order to be able to transmit the loan funds to you should your application be successful. We do not, without your express permission, attempt to access your online banking service (read only access) to view your account details and transactions. All data security policies and processes are reviewed regularly to ensure your data is treated in the correct manner.


Was this answer useful?   Yes | No

How do I recognise a suspicious email?

Online fraud is on the rise as we have written about on numerous occasions. It is important that you learn to spot fake or phishing type emails. If you have reason to doubt an email, look closely at the sending domain to check it matches the firm alleging to have the sent the correspondence. Look for typos or an odd turn of phrase. It's unlikely that large reputable firms would allow such errors in their emails to go out. Check if the firm has used any of your data to corroborate, for example, addressed you by name or used your account number or is it a generic "Dear customer" type email. Do not reply to the email and do not click or tap any of the links. Delete the email from your inbox.


Was this answer useful?   Yes | No

I have received correspondence from you, how did you get my details?

We send communications to customers who have consented to receive our marketing or in connection with any of the services we provide. You can opt-out of any marketing communications at any time by getting in contact with us or if appropriate logging in to your account and updating your preferences in the appropriate area.


Was this answer useful?   Yes | No

What should I look for to tell if a site is safe to make payments through?

You can usually tell a secure site by a small gold padlock within the address bar at the top of the browser. The address of secure web pages also begin with "https". If you are unsure about a site, if you think something looks suspicious, if you can't see the padlock symbol, or if the web address begins with anything other than "https", don't enter any payment details. You can get in touch with us and we can investigate.


Was this answer useful?   Yes | No

What is malware and how do I protect myself from it?

Malware is short for "malicious software". This is software which has been specifically designed to damage or cause other problems on a device. Certain types of malware can also be used to gain access to or control of a device, or to steal passwords and documents, usually without the knowledge of the owner. You can protect yourself from malware by ensuring your anti-virus programmes and software are up to date on your devices, ensure you are browsing on a secure connection and be mindful of downloading information and documents from sources you do not know.


Was this answer useful?   Yes | No

Are there any differences between a computer virus and a worm?

A virus is a malicious code which looks to attach itself to an existing file or programme. A virus will infect a file on your device and replicate, attaching these replicas to other files and programmes within the same device. Viruses are usually designed to cause damage to devices, such as corrupting files or deleting them entirely. Viruses are spread to different devices usually by human error, an infected file can be emailed, uploaded to shared drives or downloaded to a USB drive.

A worm is a type of virus, although the key difference is that a worm is usually a standalone programme, as opposed to a piece of code. Worms are self-replicating and once installed, will look for a way to spread within computer networks or to other devices without being actively "sent" like a virus.


Was this answer useful?   Yes | No

What is a Trojan virus?

A Trojan is a type of malware which masquerades as a legitimate piece of software. When launched, it can attack the host device itself, spread other malware such as viruses, or simply sit within the infected device gathering information without the user's knowledge. Trojans can also create a "back door" entry into the user's system, giving malicious users full access to the device. Trojans don't infect other files like viruses, or replicate to spread through a system like worms.


Was this answer useful?   Yes | No

What is a Keylogger?

A keylogger is a programme which can keep a record of what you type on your computer. It can be used to steal passwords (storing them for future use or sale), log in details, bank or card details or PINs.


Was this answer useful?   Yes | No

What is Phishing?

Phishing is a type of cybercrime which is specifically designed to trick you into disclosing information. This is usually financial information, such as details about your bank or credit card information. Typically, victims receive emails or phone calls asking them to log into a website to confirm a security threat or check their information. This is a fake site which may look legitimate. By logging into the website, victims have provided the cybercriminal with their user names, passwords, answers to security questions and potentially PINs.


Was this answer useful?   Yes | No

What is Spyware?

Spyware is software that is designed to record and send your data to a third party without your knowledge. Spyware will rarely cause malicious damage in the same way as a virus, however the software can record and share your activity on your device, such as login details and passwords.


Was this answer useful?   Yes | No

What is a Drive-by Download?

A drive-by download (sometimes called a "drive-by installation", although this usually applies to Trojans) is a download of malware onto a device which either happens without a user's knowledge, or is authorised without understanding the consequences. It can happen when visiting an infected site, or by downloading a counterfeit or unknown programme.


Was this answer useful?   Yes | No

What is a Rootkit?

A rootkit is a programme which enables access to a device and can hide or cover up its presence and often the presence of other forms of malware. When installed on a device, rootkits are usually undetectable to the user and can also sometimes mask itself from security software.


Was this answer useful?   Yes | No