Data privacy and data security are two very hot topics in the ARM industry today. The California Consumer Privacy Act (CCPA) is set to take effect in January 2020, with additional privacy bills now pending in at least 25 states. Meanwhile, cyber crimes involving consumers’ personal data are growing in number, size, and sophistication.
Data privacy: Understanding and Preparing for the CCPA
“Information like name, email address, collections history, purchase history, payment history, and determinations that you make off this (this person is likely to pay on time, they’re not likely to pay on time)—all of those things were not considered personal information in the traditional sense under U.S. law. That all has changed.” – Odia Kagan
- Your headquarters are in California;
- Your employees are in California;
- Your company is incorporated in California;
- Your company satisfies the definition of a California foreign entity; or
- You conduct out-of-state sales or transactions into California.
Minimum business thresholds are defined as:
- You conduct business activities in California and your annual revenues exceed $25 million;
- You’re involved with personal data of more than 50,000 consumers, households, or devices (this could even include unique blog visitors); or
- Sales of personal information—including value acquired from its use (via data analytics, for example)—accounts for at least 50% of your annual revenues.
- Map your data flows and processes
- Determine your role under the law (independent business, service provider, or vendor)
- Look carefully at legal purpose as well as GLBA and FCRA exemptions and whether they apply
- Determine how you’ll comply with consumer requests within the required 45-day window
- Reevaluate your internal processes
- Plan for CCPA disclosure
“So it’s basically looking at processes, looking at the information, seeing how [you] get to it, how [you] can produce it. Then the other question is, ‘Once I know how to collect all of this information, how do I provide the disclosure that CCPA requires me to provide along with all the information I am giving?’” – Odia Kagan
Data security: Reducing the Risk and Impact of Cyber Crime
Have a specific plan in place
“Some of you saw there was a high-profile breach in the collection space earlier this year. One of the things that came out . . . was that maybe they took a little bit longer to get a plan in place and respond. And so at times, that can make the cost even greater or the damage even greater.” – Ben Johnson
Monitor operations in real time
Change the way you store old data
“[Data] almost was seen as a . . . valuable asset—to have all this data, all of this knowledge, all of this experience. And secondly, data storage is relatively cheap. So another year goes by, another million records go on the server. [ . . . ] I think as an industry, collectively, we’ve really got to start sharing best practices, talking about what we’re doing to get old files offloaded.” – Ben Johnson
For More Answers and Advice, Catch the Complete Webinar
Disclaimer: Ontario Systems is a technology company and provides this blog article solely for general informational and marketing purposes. You should not rely on the content of this material for any other purpose or as specific guidance for your company. Ontario Systems’ advice, services, tools and products described herein do not guarantee compliance with any law or industry standard. You are ultimately responsible for your own company’s actions and compliance efforts. Because everyone’s situation is different, you must consult your own attorneys, accountants, and/or other advisors to obtain specific advice on your company’s compliance, legal, tax, regulatory and/or other business needs. Despite Ontario Systems’ efforts to provide current and up-to-date information, you need to recognize that the information contained herein may become outdated quickly and may contain errors and/or other inaccuracies.
© 2019 Ontario Systems, LLC. All rights reserved. Information contained in this document is subject to change. Reproduction of this publication is not permitted without the express permission of Ontario Systems, LLC.
If you read part 1 of this two-part blog series or listened to part 1 of our AccountsRecovery.net webinar “Email Is Hot, Texting Is Hotter: Don’t Be the First to Get Burned,” you might have found some of our comments surprising. Perhaps you left with more questions...
Is communicating via email and text still a pipe dream for your collection operations? If so, you might want to settle in and keep reading. It really isn’t as scary as you might expect. Despite the high costs and marginal returns of relying on phone calls and...
The ARM industry and consumers see the CFPB’s proposed rules through very different lenses. Collection agencies are trying to get ahead of what may be the final rules so they’re ready to comply, while consumers are demanding clear, unequivocal protection from...
This is the final post in our OS blog 2.0 series highlighting the “ARM ecosystem”—what it is, how it works, and how ARM businesses can benefit by adopting this approach. With its dense maze of business, legal, and market challenges, the ARM industry is a tough one to...
In the accounts receivable management (ARM) industry, policies and procedures aren’t just helpful to have. They’re critical protection for collection agencies, whose compliance risks are myriad and ever changing. Policies and procedures are of little use, however, if...
This is the third of four posts in our OS blog 2.0 series highlighting the “ARM ecosystem”—what it is, how it works, and how ARM businesses can benefit by adopting this approach. In the collections business, as in all industries, time is money. Time well spent is...
If you missed Part 1 of “What the CFPB Rules Mean to You,” and you’re concerned about how the proposed rules might affect your operations, I recommend giving it a read. Based on a panel discussion I recently participated in (you can access the webinar here), Part 1...