We invite you to experience the Birchwood difference. Fill out the form to the right and a representative will contact you with more information.
We invite you to experience the Birchwood difference. Fill out the form to the right and a representative will contact you with more information.
There’s no question that data security is critically important. Even a small security breach can bring your entire business to a screeching halt, land your company on do not serve lists, and paralyze your staff. In addition, the costs – financial and to your reputation – can be deep, crippling your organization’s stability and standing in the marketplace.
Birchwood systems and processes comply with the most stringent security standards - the SSAE16 (Statement on Standards for Attestation Engagements No. 16), put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA).
Maintaining data security is our highest technical priority.
To learn more about your responsibilities as a Birchwood end user please review our Access Security Requirements.
Businesses that handle confidential consumer credit information must be compliant with a number of federally regulated laws including:
The Fair Credit Reporting Act (FCRA): This act regulates the procedures around collecting and disseminating consumer information related to education, employment, credit, criminal activities, etc.
The Fair and Accurate Credit Transaction Act (FACTA): This amendment to the FCRA requires consumer reporting agencies to provide consumers with one copy of their file per a twelve-month period. FACTA also comes into play in cases of identity theft (an affected consumer can place a fraud alert on their file for national consumer reporting agencies) and in the secure disposal of any reports or other sensitive information (both physical and digital).
The Gramm-Leach-Bliley Act (GLBA): (The “Safeguards Rule”) This law pertains to the consumer privacy and the protection of non-public personal information. It requires institutions to provide a written information security plan that assesses and addresses any potential confidentiality risks. It also requires a financial institution to provide privacy notices to its customers. This act also addresses procedures in case of security breach.
Computer criminals are a resourceful lot with a seemingly endless amount of patience when it comes to wreaking havoc on your system. Malware that exploits existing security vulnerabilities in your software can launch an attack in a variety of ways – via behind-the-scenes auto installs, fraudulent “phishing” links, and so forth. However, there are a number of precautions that you can take to thwart their efforts:
Not all security risks are technical. Sometimes, to err is human. Paying attention to the human element as it relates to data access and sharing can help you improve security as much as technical precautions.
If you have any questions about Birchwood’s data security precautions and protocols,
please feel free to call us at 800-910-0015.
© Birchwood Credit Services 2019. Web Development by CommonPlaces Interactive