Data processing

Your access to your claims
You don’t need to download an app — a web address is all you need: on the TCM BE CREDITORS ONLINE webpage, you can view each of your claims in detail, communicate with us, and download statistics.
Request your username and password if desired.

Power BI
The statistics you can create on the online page for accounts payable (TCM BE CLAIMS ONLINE), are produced by Microsoft’s Power BI. When you log in, you have direct access to this utlramodern tool that allows you to process figures in various ways and analyze info graphically.

Integration with existing accounts payable systems
If you have aadfinity / Count-e / exact / Yuki / 1616 / Casius are customers, an automated claims transfer system has already been implemented.
We also develop custom APIs (Application Program Interface; automated communication between your system and ours; significantly reducing administrative workload) when appropriate due to volume. Lees meer. (Voorbeeld Yuki)

Cloud-based servers
Collecting debts is done by people, who are talented and competent and trained to listen and advise. They should be in a position to focus on the essentials. To be able to do that, they have the proper support necessary. Our computer systems are designed specifically for that purpose and are regularly maintained and updated. Our credit controllers have access to current information in a structured manner.
Our systems are cloud-based and thus can be accessed from anywhere in the world through a simple web connection.
- Our collection software is hosted by AWS: Amazon Web Services
- For emails, we use the MS Office 365 platform
- Our telephony is linked to the web (voice over IP)
One of the most obvious advantages of such a structure, is the ability to work from home. The other obvious advantage is easy access for creditors to their claims.

(Be)safe(d)
Creditors (and the GDPR legislation) require security in terms of accessibility (hacking) and backup.
- Backups: these systems are backed up in the most professional ways. No information could be lost that way, and when something occurs, we would only be prevented from performing our work for a few hours.
- Collection Data Base security: our AWS-database is regularly monitored through penetration testing, protected by layers of specific security software, and maintained by a company with many skilled people: EASI.
- Email security: our e-mail traffic is filtered for malicious content by a layer of specific software between Office365 and our PC.
- Protection against threats and malicious activity: our PCs are secured with an Autonomous Artificial Intelligence Endpoint Security Platform. This system, SentinelOne named, monitors activity on the PC, detects unusual tasks and can even revert to the last safe state in case of emergency.
- Password program and policies: all employees use a reputable password safe: Dashlane. This ensures that each application has its own password and that these are changed regularly.
Skilled hackers will be able to slip through some cracks in the security system, but if they are so skilled, we think they have more interesting targets.
Telephony
Phone calls are our essential tool in debt collection: we must be easily reachable (feel free to test this yourself), and we need to be able to link incoming calls to the right people or files.
- Identification: Incoming calls trigger our collection software to locate the caller’s claim, allowing us to greet them personally (“Hello Mr. Smith…”), which enhances our efficiency.
- Other communication channels: the system generates letters, emails, text messages, and more.

Scan
- Incoming documents: all documents are scanned and stored in the correct file within the database.
- Outgoing documents: all outgoing documents are generated as PDFs and stored in the correct file within the database. When applicable, they are forwarded to a third party for physical mailing.

Banking and payments of debtors
- Our letters, emails, and text messages to debtors include a QR code (or a link to a payment application) that simplifies payment processing and minimizes potential errors.
- Payments from debtors are directed to a separate, dedicated bank account (escrow account). Most payments include the correct reference and are automatically assigned to the corresponding claim without any manual intervention.
- Every day, we download CODA files from the bank. Our system reads these payments but does not allow any modifications, leaving little room for error.

Transfer of amounts collected and billing
- As a standard procedure, we transfer collected funds once a month. We could do this more frequently, but that would create additional administrative work for creditors (it has less impact on our administration thanks to automation). However, we can also transfer funds at any time upon your specific request.
- We transfer the funds to the bank account specified in the contract, or to the one you have specifically requested in writing. Your bank account details are securely stored in our database, and manual tasks are minimized to prevent errors.
- Each amount collected in a file that has not yet been transferred is automatically selected by the system, allowing an invoice (remittance report) to be generated. Payment then follows.
Don't take our word for it. Read what our customers say about us.
We are recommended by the following Belgian business federations
Developed with the support of:
