- Strict accounting controls are maintained over all accounts referred for collection with a strict double entry accounting record of all financial transactions, payments, fees, costs, etc., maintained for each debtor account received.
- Audit trails for monitoring individual collection actions, performance and privacy.
- Details of all actions, letters and oral communications with the debtor.
- Completing reporting to the client of the progress and present status of all accounts referred.
- The ability to quickly incorporate any special requirements of the client into our standard recording and reporting procedures.
Global Credit Solutions owns a highly sophisticated Online file placement and management system and its functionality can be summarised as a powerful supply chain management that connects debtors, agents, partners and clients.
Another benefit is, the information is available real time. This facility means that information is available during any stage and can be used to make decisions during the collection procedure to maximise results.
The debt collection databases and collection systems functionality are specifically designed for control and reporting of high-volume debt collection activities and provide:
Global Credit Solutions systems can communicate with external systems through custom built API's, enabling the migration of data between systems.Compliance, Cloud Systems Access and Security
The collection system has been assembled with a high level of security and there are a number of components and levels involved in this protection. We have ensured that the hosting service provider is SSAE16 compliant and listed in the U.S. - E.U. Safe Harbor List adhering to compliance standards set by multinational clients.
The systems themselves are protected by a firewall; account logons and passwords protect the database and the internal IT functions. Account logons and passwords protect system users, and then by security levels within the software running the system. The users are further separated from each other by logical barriers, which are programmed, into the system.
Logs are also kept and inspected daily not only from the firewall but also from each user logging onto the system.