VeriFacts, Inc. Exceeds Data Security & Compliance Requirements, Achieves TECH LOCK Certified

  • Email
  • Print
  • Printing Articles

    1. Click here to print!
    2. ...or print directly from your browser by choosing File > Print... from the menu or by pressing [Ctrl + P]. Our printer-friendly stylesheet will make sure extraneous website stuff isn't printed.
    3. You're done!

    Close this message.

  • Comments
  • RSS

TECH LOCK, Inc. announces VeriFacts, Inc. a trusted partner and invaluable resource for creditors, student loan entities, buyers, agencies, and law firms has completed their TECH LOCK® Certified assessment to validate their Service Provider compliance with applicable federal and state laws by ARM Industry security professionals. TECH LOCK® Certified is a comprehensive holistic data security audit, performed by ARM Industry-centric information security professionals, combining multiple regulatory and industry standard control objectives into a single assessment.

“In today’s data breach-aware world it is critical to select the right partner for an independent third party audit,” says Andrew House, chief information security officer and vice president of information technology at VeriFacts. “That is why VeriFacts selected TECH LOCK; their expertise in the ARM Industry and the thoroughness of the TECH LOCK® Certified assessment is unmatched. Our TECH LOCK® Certified status shows that VeriFacts has exceeded industry-defined requirements and is appropriately managing risk, and places us in an elite group of organizations that have earned this certification. This designation comes after an extensive process that involved assessing more than 250 IT security checks across multiple areas of VeriFacts.”

“VeriFacts services clients in multiple industries with complex regulatory requirements,” says Todd Langusch, TECH LOCK’s president and chief executive officer.  “To exceed those requirements and achieve TECH LOCK® Certified status, VeriFacts implemented a comprehensive and robust security-based infrastructure around its application services, facilities, administrative policies and all aspects of its technical operations. As the CIO of a large Debt Buyer and an ARM Industry consultant, I have seen service providers try to get by with providing a PCI DSS quarterly scan certificate or misusing a report focused on the internal controls around financial reporting (SSAE 16) and not data security. VeriFacts is in an elite group of service providers that can say and show that their controls were assessed and validated against multiple requirements. These include but not limited to FISMA, HIPAA, ISO 27002, PCI DSS, GLBA Safeguards Rule, Massachusetts 201 CMR 17.00, Nevada NRS 603a, and more.”

VeriFacts has been a trusted partner for over 25 years helping bring our clients a competitive edge by locating and verifying places of employment, residential location information, and no contact solutions. Keeping customization at the forefront, we provide complete cradle to grave work flow strategies. The verified information we return is 100% guaranteed accurate.

TECH LOCK, Inc. is a Payment Card Industry Qualified Security Assessor (PCI QSA), Approved Scanning Vendor (PCI ASV), and HITRUST CSF Assessor specializing in holistic information security, compliance, and information technology solutions. There is no “one size fits all” technology solution. TECH LOCK has the specialized knowledge, experience, and staff to understand your business and provide a solution that is aligned with your key goals and strategy. Compliance validation is performed in areas such as PCI DSS, HIPAA/HITECH Act, HITRUST, GLBA, Red Flags Rule, ISO 27002, FISMA (NIST 800-53), Nevada NRS 603a, Massachusetts 201 CMR 17.00, and CFPB Readiness. TECH LOCK is a service disabled veteran owned small business. For more information, please visit www.techlockinc.com.

  • Email
  • Print
  • Printing Articles

    1. Click here to print!
    2. ...or print directly from your browser by choosing File > Print... from the menu or by pressing [Ctrl + P]. Our printer-friendly stylesheet will make sure extraneous website stuff isn't printed.
    3. You're done!

    Close this message.

  • Comments
  • RSS

Posted in Collection Technology, Data Security, Skip Tracing .

×
Subscribe to our email newsletters

Continuing the Discussion

We welcome and encourage readers to comment and engage in substantive exchanges over topics on insideARM.com. Users must always follow our Terms of Use. Also know that your comment will be deleted if you: use profanity, engage in any kind of hate speech, post an incoherent or irrelevant thought, make a point of targeting anyone, or do anything else we find unsavory. Your comment will be posted under your current Display Name, shown below. If you'd like to change your Display Name, you must update it on the My Profile page.

Leave a Reply