Cyber Security

At Leena Finance, protecting your data is just as important to us as getting you the right home loan.

You’re trusting us with big things. We take that seriously.

We don’t just collect information because we’re curious. Every question in our Fact Find is designed to help us give you accurate, tailored advice, stay compliant and to get your loan approved faster, with less back-and-forth later on.

And behind the scenes, we’ve built our business on digital systems that prioritise security, encryption, and privacy.

What We Do & Use to Protect You

Secure Data Handling

·       Encrypted Data: All information is encrypted both during transmission and while stored, safeguarding your documents against unauthorised access.

·       Isolated Environments: Separate the development and production environments, reducing the risk of data exposure.

  • Data Collection: We collect personal information directly from you, including identification details, financial information, and credit-related data, solely for purposes such as managing your relationship with us, complying with legal obligations, and improving our services.
  • Sensitive Information: Any sensitive data, like health or ethnic background, is only collected with your consent and when necessary.
  • Data Storage: Your information is stored securely in both electronic and paper formats, with measures in place to protect against misuse, loss, or unauthorized access.

Smart, Minimal Access

Only the team members working directly on your application can access your information.

Member of the ASD Cyber Security Partnership

We’re proud to be part of the Australian Signals Directorate’s Cyber Security Partnership Program, giving us access to up-to-date threat alerts, government support, and best-practice protocols.

Secure, Cloud-Based Infrastructure

We use modern, Australian-compliant platforms built for digital mortgage broking. From document storage to client communication, everything is designed with security first.

Marketing Preferences: We may use your information for direct marketing purposes, but you can opt-out at any time by contacting them.

Transparent Records

Every time data is accessed or moved, it’s logged. We maintain audit trails so that your information is always observable and protected.

Cybersecurity Measures

  • Security Hub: Regular ongoing training and review of resources and tips to help our team stay safe online, emphasizing the importance of cybersecurity in today’s digital landscape.
  • Compliance and Certifications: Our software and systems undergoes independent reviews and maintains industry certifications to demonstrate their commitment to embedding security into their platforms and organization.

Certified Security Standards

  • SOC 2 Compliance: Our systems / software has undergone independent audits to verify adherence to strict security protocols, ensuring your data is handled with the highest standards.

Robust Infrastructure

  • Server Hardening: Production servers are fortified by disabling unnecessary services and enforcing strong configurations to prevent vulnerabilities.
  • Restricted Access: Access to production systems is tightly controlled, limiting exposure to potential threats.

Secure Document Collection

  • Phishing Protection: By moving document collection away from email, our software reduces the risk of phishing attacks, a common source of data breaches.

Commitment to Privacy

  • Australian Privacy Principles (APPs): We adhere to the APPs as outlined in the Privacy Act 1988, ensuring your personal information is collected, used, and disclosed responsibly.
  • Notifiable Data Breach Scheme: In the unlikely event of a data breach, we comply with the mandatory notification requirements to keep you informed.

 

 

What This Means for You:

Your data is encrypted at every stage
Data access is strictly controlled
Cybersecurity is built into our infrastructure
We proactively monitor for threats
We safeguard against phishing and data breaches
Your privacy is backed by compliance

Every security measure we take is designed to protect your data, ensure confidentiality, and maintain industry-best security standards.