Compliance & Security



Member Driven Technologies (MDT) is committed to protecting our Client Credit Unions’ environment and their membership data.  MDT provides a wide range of products and services that require us to ensure compliance with various applicable standards, such as the Gramm-Leach-Bliley Act, NCUA 12 CFR Part 748, to name a few.  MDT ensures appropriate compliance controls are in place to identify risks, safeguard credit union information, and protect the reputation of the credit unions and their ability to conduct business.

On a continual basis, MDT voluntarily participates in third party audits and we pride ourselves in making constant improvements to stay ahead of audit and regulatory requirements.  Member Driven Technologies has established a control framework for securing credit union internal assets and maintaining compliance as a service organization providing financial processing to our clients.  We have also successfully completed the SSAE16 Type II (SOC 1) review and continue to build our entire service management approach around industry-standard best practices.



MDT understands the critical importance of securing our client’s data – in their internal environment, as well as providing protection to them from external threats.  The preservation and enhancement of MDT’s reputation is directly linked to the way in which both information and information systems are managed.  Maintaining an adequate level of security is one of several important aspects of both information management and information systems management at MDT.

MDT’s own vital information and the information which has been entrusted to us by client credit unions, is secured in a manner commensurate with its sensitivity and criticality.  Security measures are employed regardless of the media on which information is stored (disk, magnetic tape, paper, etc.), the systems that process it (personal computers, firewalls, voice mail systems, etc.), or the methods by which it is moved (data transfer).  Information is also consistently protected no matter what stage in the life cycle process, from origination to destruction.




SOC Web_2c