Is my client's home loan data safe and secure in LoanCheckr?

Modified on Sun, 3 Aug at 2:50 PM

Think of the Consumer Data Right (CDR) system as a new, ultra-high-security digital bank vault. Your customer's data is the valuable content inside, and you, as their broker, have been given special permission to access it.

Here’s how the system ensures that data is incredibly safe at every step:

1. Getting Access to the Vault (Accreditation)


Before anyone can even think about receiving data, they must go through a rigorous government approval process run by the ACCC. This isn't a simple sign-up form; it's an exhaustive check.

  • Like a Police Check for Your Business: The ACCC conducts "fit and proper person" checks on the company and its directors.
  • Proving You're Insured: You must have adequate professional indemnity and public liability insurance. [2] This ensures that in the highly unlikely event something goes wrong, there are resources to make it right.
  • Building a Fortress First: The most crucial part is that you must prove you have a secure system before you are granted access. This involves a mandatory, independent security audit where experts examine your systems to ensure they meet the government's high standards.


In simple terms: You can't get a key to the vault until the government has thoroughly vetted you and certified that you have a secure place to put the valuables.


2. How the Data Travels (The Armoured Car)


When your customer consents to share their data, it doesn't just get sent over a normal internet connection like an email.

  • A Secret, Secure Tunnel: The data travels through a dedicated, encrypted "tunnel" (known as an API). Think of it as a digital armoured car that travels directly from the bank's vault to your secure office. No one can see inside it while it's in transit.
  • Scrambled into a Secret Code: The data itself is encrypted, meaning it's scrambled into an unreadable secret code. [4] Only the authorised recipient (the technology platform you use) has the key to unscramble it. If anyone were to intercept the "armoured car," all they would find is a box of gibberish.


In simple terms: The data is never exposed. It's securely packaged and sent via a private, guarded route.


3. Storing the Data (Your Secure Room)

Once the data arrives, the rules about how you store it are just as strict. These are detailed in a set of mandatory rules called "Schedule 2".

  • Multiple Locks on the Door: Your systems must have things like multi-factor authentication (like when your banking app sends a code to your phone). This ensures only authorised people can even get to the door of the secure room.
  • Security Guards and CCTV: Every single time someone accesses the data, it is logged and monitored. This creates a permanent record of who looked at what and when, ensuring total accountability.
  • A Plan for Everything: Every participant must have a detailed data breach response plan. This means they have already planned and practised exactly what to do in an emergency to lock things down, notify the authorities, and protect consumers.


In simple terms: Once you receive the data, we have systems, policies and procedures in place to keep the data you've received safe and secure.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article