RentDebt Automated Collections, LLC 2802 Opryland Drive, Nashville, TN 37214 866-376-7834

OUR EDGE

Data Security: Comprehensive Security for Clients Who Wish to be Confident That Their Confidential Data is Protected.

Security has moved to the forefront of every organization due to advances in technology and the move toward an increasingly complex data environment that includes various parties sharing, transferring, handling, storing, and archiving consumer data. Security also requires large infrastructure investments to protect data and to comply with government regulatory mandates, private sector requirements, and consumer demands for confidentiality. As users and holders of client data, we understand the seriousness of our responsibility to protect client and consumer data and to ensure compliance with all federal and state regulatory mandates as well as our clients’ security requirements.

R

Multi-Level Security

True and defensible data security requires many layers of protection — external and internal, networks, systems, telecommunications, physical, personnel, and documentation — to establish defensive postures to protect data; assess and test data access and vulnerability; and respond quickly, decisively, and appropriately to attempted breaches. RDAC has implemented and maintains a comprehensive menu of security measures designed to combat the everyday and the extreme threats affecting security.

R

Extensive Security Compliance

Security compliance requirements are extensive considering the inclusive and sometimes overlapping mandates issued by federal, state, and local governments; external, private-sector businesses; and internal information technology best practices. These programs, combined with RDAC’s formal security policies and training, form a security compliance regimen that ensures RDAC exceeds industry standards.

RDAC has taken several steps to ensure broad comprehensive security compliance and certification that include:

R

CFPB Readiness

R

SSAE-16 Type II (SOC 1) audit

R

Biannual internal and external PEN testing by 3rd party auditor

R

Monthly Network Scans

R

Risk Assessment and Treatment

R

Documented Security Policies

R

Organization of Information Security

R

Asset Management

R

Human Resources Security

R

Physical and Environmental Security

R

Access Control

R

Information Security Incident Management

R

Business Continuity Management