What to Look for in a Well-Designed and Effective Information Security and Privacy Program
As the Chief Information Officer at ConServe, my role is to deliver an IT environment and organization that positions ConServe to meet its strategic goals for future growth and success by leveraging technology and delivering expert IT service that supports ConServe’s operational needs.
When looking to invest in a debt collection partner, a few of the first things that often come to mind are experience and recovery performance. However, it’s essential to not overlook the significance of information security, privacy and operational compliance, which should also be top priorities when selecting a collection agency partner.
Below are the essentials that you should look for in an agency and that ConServe has made a priority:
- Having a well-defined, mature Information Security and Privacy Program with demonstrated effectiveness through the following:P
- program built to and compliant with NIST Information Security and Privacy standards and guidelines
- PCI-DSS compliant
- SSAE 18 SOC 1 Type 2 and SSAE 18 SOC 2 Type 2 Engagements
- ACA International, Blueprint Quality Management System® certified
- Compliance Management System that manages Consumer risk, ensures regulatory compliance, and prevents Consumer harm.
- Training program that reinforces commitment to compliance, industry rules and regulations.
- Proven Disaster Recovery Plan and Incident Response capabilities
It’s critical to remember that information security and privacy are an ongoing process, requiring constant vigilance through continuous monitoring, adaptation to new and emerging threats, and investment in systems, people, and processes. By partnering with an agency that maintains critical information security certifications, implements the proper compliance checks and balances, and offers world-class training to employees, you will mitigate the risks associated with data breaches, cyberattacks and fraud.
At ConServe, we understand the value and significance of a well-crafted and effective information security and privacy program. Our Directors of Business Development would be happy to schedule a meeting with you to evaluate your cybersecurity and privacy controls to assist you in achieving a secure and compliant status.
– Justin Spooner, Chief Information Officer