At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


Part fourImproved change management process is one of the items at the very top of many collections professional’s wish list. In most legacy collections systems, the change management process is slow, expensive and labor intensive. It is not uncommon for an organization to take three, six or even 12 months to implement a system change, depending on the complexity of the request. Additionally, the expenses for a vendor or internal IT department to code, test and deploy the change can cost tens or hundreds of thousands of dollars. Aside from the cost and timelines, the impact to the business can be suffocating, particularly when the business users are unable to keep up with rapidly changing requirements.Change controlOne of the most exciting and innovative features of next generation collection management software systems is the ability to make changes quickly and efficiently, without the need for hard coding or extensive testing. Additionally, change control responsibilities can be granted to business users, who can then be empowered to make system changes, without the support of the software vendors or their internal IT departments. If desired, the change controls can be segmented or shared to ensure (via secure access rights) that only qualified individuals are empowered to make changes and that their skill and knowledge align with the assigned access. Regardless of where the control lies, the entire organization benefits from a change management process that is fast, efficient and easy to manage.The types of system changes that benefit from modern technology include just about any imaginable task. Simple screen or scripting changes fall on one side of the complexity spectrum, while modifications to database layouts lean towards the other end. Linking to other complimentary systems and data sources is also quicker and easier which enables hooks to be implemented in days and weeks rather than months or years.Financial benefitThe financial benefit metric of improved change management is relatively straight forward, although it is not always possible to accurately gauge the benefit ahead of the change event itself. For example, the financial value can be calculated as the benefit of the change itself (considering only the time it is in production) ahead of when it would have been deployed in a legacy environment. Additionally, we must factor the labor and fees that would have been spent to implement the change in the legacy system, less what was actually spent. For example, let’s assume a given change adds $50,000 in monthly benefits. Let’s also assume that we can implement and test the change in a next generation system in one week, while the same change could take six months in a legacy system. The value of the faster change is then $300,000 and we have saved a significant amount of money in labor and fees above and beyond that. One of the key benefits of next generation systems is that these collections efficiency changes can be made in days or weeks rather than months or years. Considering that in a year an organization with modern technology could design and implement many beneficial changes rather than just a handful, the return on investment increases exponentially with additional change management activity.My next blog will be the last in this “next generation collections systems” series and brings together the financial benefits highlighted in my previous blogs in the form of an ROI case study. Common objections and relevant considerations will also be discussed.Stay tuned!

For all you folks who, like me, waited until the last minute to knock out a term paper or class project in school, here is a friendly reminder…Yes, the Federal Trade Commission (FTC) pushed out the enforcement deadline of the Red Flags Rule to May 1, 2009. Yes, a sigh of relief was heard across compliance officers and operations managers nationwide. However, you should still keep a few things in mind as we approach May 1. First, per the FTC, "many entities also noted that because they generally are not required to comply with FTC rules in other contexts, they had not followed or even been aware of the rulemaking, and therefore learned of the requirements of the rule too late to be able to come into compliance by November 1, 2008." Those of you, who have not been subject to FTC enforcement in the past are quite possibly still subject to the Red Flags Rule based on your institution maintaining 'covered accounts' per the definition in the Red Flags Rule itself. Double check if you think otherwise. Second, the FTC was clear in stating that "this delay in enforcement is limited to the Identity Theft Red Flags Rule (16 CFR 681.2), and does not extend to the rule regarding address discrepancies applicable to users of consumer reports (16 CFR 681.1), or to the rule regarding changes of address applicable to card issuers (16 CFR 681.3)." So, while May 1 is still a few weeks away, if you are accessing consumer credit reports, for example, you should already have a formal written and operational process to detect and respond to address discrepancies on those credit reports.

Red Flags Rule I've heard more than one institution claim that they may limit and even reduce the identity elements (perhaps down to just name and address) that are captured during consumer applications or other transactions. Their rationale is that the fewer identity elements they request or require during these processes, the less information they will need to authenticate as part of their Red Flags Identity Theft Prevention Program. While this argument seems logical on the surface, I would suggest that if securely gathered/stored and appropriate to the nature of your business, additional data elements such as Social Security Number (SSN), date of birth and phone number can actually allow you to accomplish a few things to your benefit. 1. Analysis of our consumer authentication products shows that contributing SSN, date of birth, and phone (in addition to name and address) to an authentication process, will actually improve your ability to positively authenticate a consumer via an overall risk-based strategy. 2. The use of additional data elements, such as the phone number, can unlock additional data sources for use in verifying not only that phone number, but the inquiry name and address as well. 3. Just because you don't capture certain identity elements, doesn't mean the risk goes away. In providing additional identity elements for authentication, you can gain a more holistic view of a consumer – be that good, bad or ugly. It’s better to figure this out up front versus down the road when bills go unpaid and the bad guys scatter.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


