SKEENS CONSULTING CORPORATION
3261 OLD WASHINGTON ROAD
SUITE 1011
WALDORF, MARYLAND 20602
OFFICE: 301-932-4610 FAX: 301-932-5341
Page 8 of 8_RV-15May2013
Security Certification
Skeens Consulting Corporation depends on our computer and information systems on a daily
basis to perform our normal business operations. Skeens Consulting also has an obligation to
maintain the privacy of our customer’s information.
Since these computer systems and our Information Technology is so critical to the normal
functioning of our company, it is vital that we are protected from malicious software (computer
viruses) and unauthorized access to our computer systems both at the Corporate office, and all
of our Branch Locations. Our network of Loan Officers and employees are tied together
through the Internet, which makes our systems vulnerable to these types of undesirable items.
Therefore it is company policy that each loan officer shall have working anti-virus software
which is maintained on a regular basis. It is also company policy that each loan officer shall
have firewall protection. In many cases, firewall protection is provided by your Internet router,
or your Internet Service Provider (ISP). Please contact your ISP to find out if you are protected
from unauthorized access to your computer.
Our business also depends on keeping our Customers Non-Public Information (NPI) private
and confidential. It is therefore imperative that you understand and abide by the Corporate
Consumer privacy and Security Program.
By signing the document below, you are certifying that you have both anti-virus software and
firewall protection and that you are maintaining your anti-virus software by obtaining updates
on a regular basis. You also certify that you will review the Consumer Privacy and Security
Program once you have access to the Corporate Website.
Printed Name ___ _______________________
Signature__________________________ Date __ __
1. A Virus is a piece of programming code usually disguised as something else that causes some unexpected and usually
undesirable event. A virus is often designed so that it is automatically spread to other computer users. Viruses can be
transmitted as attachments to an e-mail note, as downloads, or be preset on a diskette or CD. The source of the e-mail note,
downloaded file, or diskette you’ve received is often unaware of the virus. Some viruses wreak their effect as soon as their
code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer.
2. Antivirus (or “anti-virus”) software is a class of programs that searches your hard drive and floppy disks for any known or
potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the
Internet by businesses concerned about protecting their computer assets.
Some common virus protection products include: Norton Anti-Virus, McAfee VirusScan, and Grisoft AVG. These can be
purchased online, or at your local computer store.
3. A firewall is a set of related programs or hardware that protects the resources of a private network or computer from outside
unauthorized users (hackers).
Some common firewall software products include Zonelabs Zonealarm (www.zonelabs.com) Norton Internet Security, and
McAfee Personal Firewall. These can be purchased online, or at your local computer store.