American Debt Resolution (ADR) uses significant safeguards, including physical, technical (electronic), and operational controls to protect your personal information, both during transmission and once received. If you have any questions about the security of your information, you can contact us at firstname.lastname@example.org.
American Debt Resolution uses Extended Validation (EV) Secure Socket Layer (SSL) certificate to ensure that when you connect to our websites you can tell that you are actually on our site and that all data entered into the websites are transmitted to us in a secure encrypted channel. Once on our system, personal information can only be read or written through defined service access points, the use of which is password-protected. Data security is achieved through technical safeguards that include a combination of encryption, firewalls, intrusion detection system, malware detection system, and data loss prevention systems. ADR also conducts vulnerability scans of applications and systems regularly.
Access to the system is tightly controlled and limited to only those who have a need to access information. Administrative safeguards such as a security awareness program, background checks, and internal information use policy ensure that only trained and trusted staff is permitted to access personal information.
Additional steps you should take to ensure the security of your information
American Debt Resolution sends important communications regarding your account or application via email. You should therefore take steps to secure and restrict access to your email account and change your email account password frequently. You should also be aware of fraudulent emails known as “phishing,” from companies claiming to be ADR and requesting your login information or other account information. ADR will never ask for your login information in an email.
When you are finished using ADR websites, you should log out completely, then close the browser window and clear the browser’s cache files and saved passwords. This step is particularly important if you use a computer that is accessed by other people, such as in a public library or Internet café.