Call: 888-887-7880 or

Email: client.services@turningpoint.com

 

Sign up for our weekly loan officer training sessions!

Register here:  MACH3 New Loan Officer Training



ACCOUNT TOOLS

MACH3 Training Videos

To view more training videos, click here to visit our MACH3 YouTube Channel. 

WHAT IS MACH3?

MACH3 opens up the era of "Intelligent Marketing Solutions" by seemliness bringing together in a single easy-to-use SaaS platform:

  • Elegant database management
  • Automated marketing activity
  • Interactive business analytics
  • Integrated production and fulfillment

System benefits

MACH3 supports all phases of marketing: lead generation, sales in process, customer retention and referral sources. Our revolutionary MACH3 system is a highly sophisticated yet easy to use "Software as a Service" (SaaS) platform that directly boosts the bottom line by facilitating core marketing functions - driving revenue growth, reducing cost and reducing risk - and it can be up and running in just a few days. MACH3 delivers these powerful strategic benefits across the enterprise:

  • Prioritized sales opportunities
  • Enhanced budgetary control
  • Regulatory compliance
  • Automated execution
  • Brand consistency
  • Speed to market
  • Rigorous data security
  • Performance accountability
  • Superior management oversight
  • Smarter use of human resources

Security:
Password Management

No staff user will ever hold or have exposure to clear passwords. All passwords are one-way encrypted. Should a user forget their password, the system will reset their password with a randomly generated one, send this new password in an email to the user's email address and the user account is flagged to force a password change at next login. The next time the user logs in with the credentials sent via email, the system forces the user to change their password before any other functionality becomes available to them. All transactions are conducted over encrypted HTTP connections.

Users will have their user accounts locked if more than five invalid login attempts occur within any 15 minute period. A password renewal policy can be enforced requiring new passwords to be created every 60 days and a non-repeat history of five-ten passwords.

If you have forgotten your user name or password

Clicking the Reset my password button will reset your password and you will receive an email shortly afterwards containing your user name and a temporary password. The first time you login with those credentials you will be asked to supply a new password of your choice. To guarantee your privacy and the security of your data, no staff have access to your password, nor will anyone ask you for your user details.

To change your password

  • Login to MACH3 with your current user name andpassword
  • Access "My security" tab and select "password"
  • Follow the on-screen instructions

Audit Trail

All actions, edits, views and instructions are logged in the audit and activity log. It reports on field changes, file upload attempts and page visits. Each time stamped session begins a fresh log file which can later be reviewed by the individual or a superior within the client organization. The audit and activity log is also used to derive a ranked list of system functions labelled "favorites" in the right margin of most pages. The system orders the functions by total hits and this becomes the ranked list. The user can use this feature to gain rapid, single-click access to commonly used functions and information.

To review your audit trail

  • Access "My security" tab and select "audit trail"
  • Select a session from the drop down list.
  • A list of functions performed during that session will appear in the panel below.

User roles and access rights

User Management

Each distinct human being setup in the system carries a unique user name and a strong encrypted password that even staff and system administrators do not have access to. During registration, company managers, loan data contacts, billing contacts and loan officers are created in the system. Users are created for each of these real-world roles.

In addition, a system role is also created and is linked to a user. This scheme allows for the same human being to fulfil multiple roles in multiple branches of not only the same organization, but also different organizations (e.g. Joe Smith can be the Manager of ABC Mortgage, a Loan Officer of XYZ Mortgage and also a Billing contact of MNO Mortgage) while only having to remember one user name and password.

A user with multiple system roles will be prompted to select a role immediately after successful submission and verification of user credentials. Once logged in, their home page offers a "fast-switching" method to switch between their available roles. A user with only one role is logged into the system in that role immediately after successful submission and verification of user credentials.

In addition to those users and roles created at registration, a client user may create additional users for other individuals within their organization (e.g. an assistant).

MACH3 allows corporate managers to drill-down through their organization to manage sub-ordinate organizational units and LOs, it allows office managers to drill-down and manage their LOs, it allows users to fast context switch between their available roles and it provides a coherent method for compliance officers to traverse the organizational structure reviewing all or any available details and data.

Role Management and delegation

Each client can create named roles. Each role will carry a number of mandated permissions (access to activity and audit logs, the ability to log in and log off, access to their home page, reset password, etc) and carry a subset of the creating user's permissions.

The system offers a notion of delegation whereby if permitted, a user can delegate all and any of their permissions to another new user or role. A given permission may be delegated by one level only. Revoking a delegated permission or disabling the delegating user's role will result in revocation of the permission across all delegate user roles.

Effective use of roles enables a company to exercise a fine level of control over what user roles exist, what permissions each of them need and offers a level of assurance that their data management and security policy wishes are being carried out.

Permissions Management

The default permission sets for company manager, loan officer, loan data contact and billing contact can be overridden by company-defined permissions sets.

By default, a company manager has unfettered access to their office details, LOs and their details. If a parent company wishes to prevent branch managers from seeing LO details, for instance, they can define their own role with this and any other permission omitted. This scheme can be used to deliver client-specific functions and content to only specific users with specific roles.

Permissions most notably take the form of a tabbed group of menu items at the top of each page. Each function or page of the MACH3 system belongs to a group. The groups a user sees after login (the tabs near the top of each page) are a superset of all groups they have access to a member function. By clicking or selecting a group or tab, the user is presented with all available functions in that group.

Permissions not only extend to being able to access a particular page (or function of MACH3) but also to individual features within a page. This is widely used throughout the system to enable (by default) read-only access to a particular page with optional additional permissions to make the page editable. If you have the permission, the edit button appears and once clicked, the UI presents additional options and features that are otherwise hidden.

During manual/automatic role selection the system retrieves the user role's current permission set and displays the available features/content based on the permission of that role.

If a user is logged in and a permission has been granted, the function will appear on the menu. If a user is logged in and a permission has been revoked, the available menu items are refreshed to reflect the updated permission set.

Individual functions, may occasionally be taken off-line for a short-time to perform system maintenance. In this case the off-line function will appear in the menu with a strike-through and selecting it will yield a notification that the function is currently off-line and unavailable. Functions may also be highlighted on the menu to draw attention to new and important options.