Security, privacy, and transparency built for enterprise credit operations.
SCREDIT is designed for organizations managing credit workflows, receivables operations, and sensitive customer data. This Trust Center gives procurement, security, and business teams a single place to review our legal, privacy, and security posture.
Data ownership
Customer-controlled
Your organization remains the owner of customer, financial, and workflow data submitted into SCREDIT.
Access model
Least privilege
Role-based controls, separation of duties, and audited administrative access are built into the operating model.
Security posture
Security-first
Architecture, monitoring, logging, encryption, and change management are designed to support enterprise reviews.
Trust principles
The SCREDIT trust model combines platform controls, operating discipline, and customer-facing transparency so enterprise buyers can evaluate the product with confidence.
Tenant-aware data isolation aligned to your schema-per-tenant platform model.
Encryption in transit and at rest for sensitive platform and business information.
Role-based controls for finance, credit, collections, and administrator personas.
Centralized logging and auditability for privileged actions and core workflow events.
Controlled vendor and integration usage for hosting, email, and bureau data flows.
Documented legal, privacy, and security materials for procurement and customer reviews.
Compliance posture
These materials are designed to support enterprise procurement, security questionnaires, and initial vendor reviews while EFILOS advances its formal compliance roadmap.
SOC 2-aligned control posture and readiness program
Privacy-by-design operational practices
Subprocessor and vendor review discipline
Incident response and breach communication planning
Security review support for enterprise procurement teams
Audit trails for sensitive workflow and approval activity
Designed for credit and risk teams handling sensitive business data.
SCREDIT supports operational teams that work with application data, trade references, and collections records. The security experience should feel clear, mature, and procurement-ready from the first review.
Identity and access model designed for admin, analyst, approver, collector, and reviewer workflows.
Network and application boundaries designed to support WAF, load balancing, service segmentation, and secure APIs.
Observability model for system health, operational errors, and security-relevant events.
Data handling model for customer accounts, credit applications, financial statements, and external bureau workflows.
Policies and documents enterprise buyers expect to see.
Access the resources directly through our legal hub so stakeholders can self-serve the materials they need for compliance and legal review.
Security Whitepaper
Overview of SCREDIT architecture, platform safeguards, encryption, logging, and operational security practices.
Privacy Policy
How EFILOS collects, uses, stores, and protects platform and website data across SCREDIT experiences.
Data Processing Agreement
Controller-processor responsibilities for enterprise customers using SCREDIT to process business and applicant data.
Applicant Privacy Notice
Applicant-facing notice for organizations collecting credit applications, references, and financial data through SCREDIT.
Terms of Service
Use terms covering platform access, lawful use, service boundaries, intellectual property, and account responsibilities.
Cookie Policy
Website cookie and analytics disclosure suitable for EFILOS marketing and product web properties.
Common questions from customer security and procurement teams.
Who owns data stored in SCREDIT?
Customer organizations retain ownership of their business and applicant data. EFILOS operates SCREDIT as the secure software platform used to process that data on the customer’s behalf.
Does SCREDIT support enterprise security reviews?
Yes. The Trust Center, legal package, security whitepaper, architecture diagrams, and compliance artifacts are designed to support customer procurement and security evaluation processes.
How does SCREDIT handle sensitive credit information?
The platform is designed around least-privilege access, tenant-aware isolation, encrypted transport and storage, controlled workflows, and logging for sensitive actions.
Where should customers report security concerns?
The Trust Center provides a direct security contact path so enterprise customers, partners, and researchers can raise concerns through a controlled disclosure channel.
Need a direct security review path?
For vendor reviews, security questionnaires, or architecture discussions, direct teams to our controlled trust and legal workflow.