Tag Archive | "LOGS"

More Damaging Info of Lender Processing Services (LPS) Emerges From Ex-Employee

More Damaging Info of Lender Processing Services (LPS) Emerges From Ex-Employee

Abigail Field’s latest article is a must read. Forget the energizer bunny, this just keeps going and going…it does not stop.

from DailyFinance

When an LPS client has a mortgage that goes into default, Lofton explains, LPS starts managing the loan. In order to do that, the appropriate LPS employees are given login information for the bank’s database. As a security measure, each login is unique. That login grants access to the bank’s entire database of current and defaulted loans, so that the employee can address whatever problem exists. For example, if a payment that should have been applied to a defaulted mortgage was accidentally credited to a current mortgage, the LPS employee needs access to the current mortgage to fix the error.

When an employee can’t fix or reconcile data in an account, she is supposed to enlist the help of her supervisor, and if needed, her supervisor’s supervisor. Each manager also has unique login information, and each bank apparently has additional security protocols that LPS employees are supposed to follow. If the employees and supervisors were following the rules, all would be relatively well. But according to Lofton, they were not:

“…109. …most of the [LPS] Associate Team members had gained unauthorized access to the logins and passwords of their team associates and supervisors for all of the bank servicers’ computers.

110. With this unauthorized access to the Bank’s computers, the [LPS] associates could go into the banks computer files and manipulate the data….

112. I was particularly concerned that during “crunch” times …Team Associates were cutting corners….

116. When an employee cut corners, the employee left out one or more steps that should have been performed and had to make something up.

117. The problem caused by cutting corners might not come to light until six months down the road when an attorney asks questions about the billing record.”

[ipaper docId=51504071 access_key=key-jzpv6rz6sbm9fatwei height=600 width=600 /]

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in STOP FORECLOSURE FRAUDComments (0)

Foreclosure Mills and The 4 Minute Foreclosure

Foreclosure Mills and The 4 Minute Foreclosure

For you to understand a little more about “the 4 minute foreclosure” you first have to know some key players in the controversy surrounding the foreclosure process today. I included a few excerpts from an article written by Gerlad B. Alt for DS News March of 2007 that you will find at the end. I only wish MERS was included in this article because without this device none of this would have been made possible.

The Federal Home Loan Mortgage Corporation (FHLMC), known as Freddie Mac, is a public government sponsored enterprise (GSE), headquartered in the Tyson’s Corner CDP in unincorporated Fairfax County, VirginiaFreddie Mac, one of America’s biggest buyers of home mortgages, is a stockholder-owned corporation chartered by Congress in 1970 to keep money flowing to mortgage lenders in support of home-ownership and rental housing.

Freddie Mac was the first investor to improve on the so-called standard timeframes by tightening the noose and imposing what seemed at the time like draconian and arbitrary standards for completion of legal actions for foreclosure and bankruptcy. To reinforce its point, the Federal Home Loan Mortgage Corporation adopted a designated counsel program under which the attorneys chosen to participate were expected to meet and be graded against these more stringent dates.

LOGS Network is a multi-state network of title companies and law firms and connecting them via a proprietary web-hosted software system. They developed a proprietary statistical program called ASAP (Attorney Scorecard and Performance) to help manage the more than 250 law firms its outsourcing division. By introducing , invented the field counsel industry that serves residential mortgage banking. LOGS Network was co-founded by Gerald M. Shapiro of Shapiro & Fishman PA a law firm who handles foreclosures for the financial industry. His network held a virtual monopoly on all foreclosure and bankruptcy work nationwide until the early 1990s. In addition, he preempted the entire industry by creating the “cradle to grave” concept through business developments in title, closing, document preparation, foreclosures, REO, outsourcing, collection, and debt acquisition businesses.

Fidelity National, a national default outsourcing and information provider, was one of the first in the industry to implement time-frames a high priority instead of a guideline standards. It instituted a policy recognizing and rewarding those attorneys who did work for its clients in a consistently shorter time than their competition. Fidelity mentality was the faster the better and by publicizing and comparing the time to completion of various legal tasks among the hundreds of law firms doing work for its client base. It created a demand for attorneys to keep up with their business practices in the same sequence that other industries have had to in the sense of “recreating the wheel” so to speak to keep up with growing competition.

By having a goal of recovering nonconforming assets for the servicers this put pressure on the time frames they had in order to recover title.

Of course, when the only acceptable
test for quality becomes a simple test
of speed, it is inevitable that some of
the participants will feel compelled
to cut corners to stay in the game.

Click Image For PDF


© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in STOP FORECLOSURE FRAUDComments (1)

Max Gardner’s Rules for the Examination Of The Electronic Document Custodian

Max Gardner’s Rules for the Examination Of The Electronic Document Custodian

Written on June 22, 2010 by admin

State your full name and current position.
Provide us with your definition of a document custodian.
What is your exact job title?
What are your responsibilities?
Where are you employed?
Where does your company store original documents?
How are they stored?
If you outsource this storage, who is the outsource provider?
How do you confirm delivery to the outsource provider?
How do you retrieve original documents?
How long do you save original documents?
Do you have a written original document destruction policy?
Please explain it and produce a copy of the policy.
Do you retain images of original of all documents?
How are they retained?
Where are they retained?
How long are they retained?
What type of computer system is used for the image retention?
Do you have a Records Compliance or Management Department?
Explain how it works, who is employed there, and where it is located.
Describe all information that you store electronically.
Do you have an ESI manager?
Who, where does he or she work, what does he or she do?
What is your policy on the retention of electronically stored documents?
Do you have a written policy for ESI documents?
Do you have any automated archiving systems?
If yes, then explain how they work and how documents are achieved.
Where are the archived documents stored?
How do you save data to a file that has already been achieved?
State the name of the director or manager of your document archiving operation.
How do you store data acquired through mergers or acquisitions?
How do you retrieve historical data from the archives?
Explain the process in detail.
Do you have an organizational-wide data map or inventory of all electronically stored data?
Can you produce a copy of that map?
Do you have any litigation ready data files?
Where are they stored?
How are they created?
Who is in charge of creating these files?
Why are they created?
Is there such a file in this case?
Where is the data stored?
Do you have any electronic data stored on tapes?
Describe the data and the type of tapes?
Where are these tapes stored?
Do you maintain a disaster recovery location?
Where is it?
Do you store electronic data at this location?
How is it stored?
How long is it stored?
What types of servers are used to store the data at this location?
How long is the data stored?
Do you have a data destruction policy at the disaster location?
Please explain and produce all written protocols.
Explain how you retrieve data from the disaster location?
Explain the time and expenses involved in securing date from the disaster recovery location?
State if any data related to this case has been destroyed?
Describe the data in detail and when and under what circumstances it was destroyed.
Have you seen any notice in this case to preserve all of the ESI?
When, where and how did you see it?
Has any data related to this case been destroyed since you saw it?
Who is your Media Destruction Manager?
Where is this person located?
What are the responsibilities of this person?
Explain all of the steps your company has taken in this case to preserve ESI evidence?
Have you created a data file of ESI for this case?
When was it created?
Name all parties involved in the creation?
Where is that data filed now?
Explain all of the steps that were taken to create the ESI file for this case.
Are there any ESI that you could not find or include in the file?
If so, please explain.
If any of the data still exists, have you or anyone in your company investigated the restoration of any deleted or damaged data?
When, who did this and what did they do?
If not, then why not?
With respect to the ESI file that has been created for this case, have the documents been scrubbed for metadata?
If yes, then when, who ordered, and why?
Who was involved in the scrubbing?
Was a scrubbed metadata file created?
Who created the file and who has custody of the file?
Do you backup your data every day?
How and where is the backup data?
Who is in charge of your backup operations?
What data is backed up?
Do you back up programs and systems or just the data?
What is the difference between your backup data system and your archived data storage system?
How long is backup data retained?
What is the format for the media in the ESI file created for this case?
Did you ever stop backing up or archiving data in this case in anticipation of litigation?
If so, when, why, and who ordered such actions?
When was a litigation hold placed on the destruction of any of the ESI data related to this case?
Who issued the hold and how was it implemented?
Do you have any type of dormant document liability policy?
If so, then please explain in detail how it works?
Has any of the ESI data in this case been destroyed or deleted pursuant to a dormant document liability policy?
If so, can you identify who took such action, when it was taken, who ordered it taken, and why it was taken?
Name all parties who have access to any of the data related to this case.
Explain all security features employed by your company to prohibit the unauthorized access to any of your ESI data?
Do you keep any type of catalogue of information on tapes or other media related to historical ESI?
If so, please explain how this system works?
Where are the catalogues filed and how are they maintained?
State the names of all of the servers and the location of all such servers that contained any ESI data related to this case.
State your current policy on saving company email.
State your current archiving and backup programs with respect to email.
State all of your email format types, date ranges for retention of email, and the names of all custodians.
Please identify all types of files used by your company, the capacity of such files, the creation dates and how those dates are preserved, the modification dates and how they are recorded, and the maximum size of each file.
Does your company employ a de-duplication policy as to ESI data?
If so, please explain how it works?
Has any data in this case been subject to destruction pursuant to any such policy?
If so, identify all such ESI data.
Do any lawyers representing you in this case have access to any of your data files?
IF so, please explain the extent of such access, how it is tracked, and purpose of the same?
Have you migrated any ESI data in this case from older, disparate media sources into modern managed tools?
If so, explain in detail the older data systems, how the migration occurred, and explain the new storage media used?
Name all of the parties on the data migration team or group.
Do you have a Legal Records Management Team?
Name all of the Team members and the location?
Was the Team involved in this case?
If yes, then explain in detail the extent of their involvement.
Do you use a third-party IT vendor for ESI data capture, storage and archiving?
If so, who and how long have they been used?
Who is the on-site representative for your ESI vendor?
Does your backup vendor use DLT4, LT01 or 4MM tapes?
What type of backup software does the vendor use?
Do they use Backup Exec, NetBackup, Legato Net Worker, Trivoli Storage Manager, ArcServe, CommVault Galaxy or HP Omniback?
Describe all messaging systems used by your company.
Do you use Lotus Notes?
Do you use Novell GroupWise or any others?
How is the messaging data saved, backed up and archived?
Do you convert the messages media to any other type of media for storage?
If so, describe the media and how this is accomplished and by whom?
Explain all due diligence programs and procedures used to verify the integrity of your data?
Explain all due diligence programs and procedures used to secure and safeguard your data.
Do you maintain custody logs on the transfer of any ESI data?
What type of logs?
Who maintains and where are they located?
Do you have a “Best Practices” guide for of the operations described herein?
Can you produce it?

Source: Max Gardner Boot Camp Blog

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in bifurcate, bogus, chain in title, CONTROL FRAUD, corruption, deed of trust, deposition, foreclosure, foreclosure fraud, foreclosures, forgery, Max Gardner, mortgage, Notary, noteComments (0)

WHISTLE BLOWER | Report On Fraudulent & Forged Assignments Of Mortgages & Deeds In U.S. Foreclosures

WHISTLE BLOWER | Report On Fraudulent & Forged Assignments Of Mortgages & Deeds In U.S. Foreclosures

Pew family trusts which I am a beneficiary and/or remainderman have maintained
investments in various banks, mutual funds, and other entities that maintain
interests in various shares, mortgage backed securities and/or debt issuances and I
have been a shareholder in many mortgage companies including Fannie Mae,
Bear Stearns, JPMorganChase, Washington Mutual, MGIC, Ocwen and Radian,
many of which are members, owners and shareholders in Mortgage Electronic
Registration Systems, Inc. [MERS].

© 2010 Nye Lavalle, Pew Mortgage Institute
•10675 Pebble Cove Lane • Boca Raton, FL 33498
561/860-7632 • mortgagefrauds@aol.com

[ipaper docId=36753239 access_key=key-1xwnf3x33iwj6zod9965 height=600 width=600 /]

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in bear stearns, bogus, chain in title, concealment, conflict of interest, conspiracy, CONTROL FRAUD, corruption, foreclosure, foreclosure fraud, foreclosure mills, foreclosures, forensic document examiner, forensic mortgage investigation audit, forgery, insider, investigation, Law Offices Of David J. Stern P.A., Lender Processing Services Inc., LPS, Max Gardner, MERS, MERSCORP, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC., Mortgage Foreclosure Fraud, neil garfield, notary fraud, note, OCC, R.K. Arnold, racketeering, RICO, robo signers, shapiro & fishman pa, STOP FORECLOSURE FRAUD, stopforeclosurefraud.com, trade secrets, Trusts, Violations, Wall StreetComments (0)

Advertise your business on StopForeclosureFraud.com


Please Support Me!

All Of These Are Troll Comments