Free Reports about Debt Collection and ARM Best Practices Feed Link

Free Reports about Debt Collection and ARM Best Practices

You must be logged in to download free reports.
If you don't have an account yet, registration is free and simple. If you're pretty sure you have already registered, but don't remember your password, use the password reset tool (located under the login form).

FICO-Speech Analytics Downloadable Thumbnail

Harnessing the Speech Analytics Advantage

Conversations with consumers —- whether asking for payment or answering product questions —- are an expensive form of contact, fraught with compliance risk. When handled unsuccessfully, they can negatively impact the bottom line, as well as increase risk of fines and reputational damage for regulatory noncompliance. This paper from FICO looks at how companies can use these analytic insights to achieve profitable business goals.

Three Strategies to Shrink Bad Debt Downloadable Thumbnail

Three Strategies to Shrink Bad Debt: Presumptive Charity Care, Propensity to Pay and Partner Management

Despite the advances of the Patient Protection and Affordable Healthcare Act (ACA) related to patient debt (establishing maximum out-of-pocket expenses and other protections), most healthcare finance analysts believe bad debt will increase over the coming years.

In this free whitepaper, sponsored by LexisNexis, you’ll discover best practices from a wide range of healthcare providers who have managed to stem the tide of bad debt increases.

Tech Lock Challenge Downloadable Cover

TECH LOCK Challenge: A Compliance and Data Security Questionnaire

Using these 55 questions, developed by industry-expert Todd Langusch of TECH LOCK, Inc., you’ll be able to immediately see any vulnerabilities your agency may be laboring with.

This comprehensive questionnaire looks at the following risk areas: Risk Assessment, Security Awareness, Overseeing Service providers, Encryption, Transmission of Sensitive or Non-Public Personal Information, Firewall, System Hardening, Regularly Monitor and Test, Strong Access Control measures, General, Remote Access.


Understanding TCPA: Maximizing Consumer Outreach & Mitigating Risk

Unsure what impact the new Telephone Consumer Protection Act’s (TCPA) regulations will have on your operations and risk mitigation efforts? In this whitepaper from Neustar, cut through the clutter and get straight-forward answers for how to navigate the bumpy regulatory landscape while driving business and operational value.   Download the whitepaper now to learn: What […]


The Quarterly Review – Keys to Sustaining Revenues, Tips for Your BOD and Investors, M&A and CFPB Update

Regulatory and economic changes continue to have a profound effect on the way that credit grantors, collection agencies, debt buyers, collection law firms and vendors are running their own businesses. In many instances, compliance trumps performance across major market segments as the new age of regulatory oversight sets in while the economy continues to recover […]


Why Is Nobody Talking about ICD-10?

With less than a year until the switchover to ICD-10, we are entering crunch time. Many healthcare providers only have just begun their planning for the transition, which must be completed by Oct. 1, 2014. More importantly, in survey after survey, many revenue cycle managers or healthcare providers claim they do not know the status of their ICD-10 project.

ICD-10 migration, contrary to what some may think, is not a “coding department problem” or an “IT problem.” Implementing ICD-10 will have ripples throughout the organization, affecting almost every department in some manner.


5 Tips to End the Credit Reporting Nightmare

Even when it’s working right, the U.S. credit reporting system affects all of us. Consumers, who pay their bills promptly, receive higher credit scores; debt collectors who accurately report consumer accounts experience increased recoveries; and lenders who rely on the credit reporting system make better lending decisions.

But the U.S. credit reporting system is in a state of disarray and this spells “n-i-g-ht-m-a-r-e” for data furnishers.