{"id":71282,"date":"2020-02-25T12:55:15","date_gmt":"2020-02-25T11:55:15","guid":{"rendered":"https:\/\/tcm.be\/how-do-we-secure-your-debt-collection-data\/"},"modified":"2025-11-26T19:54:50","modified_gmt":"2025-11-26T18:54:50","slug":"how-do-we-secure-your-debt-collection-data","status":"publish","type":"post","link":"https:\/\/tcm.be\/en\/how-do-we-secure-your-debt-collection-data\/","title":{"rendered":"How do we secure your debt collection data?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/imgi_31_SecurityArticle_small-400x250-1-150x150.jpg\" alt=\"Security computing\" class=\"wp-image-9336\" title=\"\"><\/figure>\n\n\n\n<p>Recent events have reminded us that companies\u2019 software and data processing systems need to be maintained and monitored for security.\u00a0 Debt collection has to do with people\u2019s wallets, which requires discretion.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>The law, including GDPR, imposes security measures to avoid leakage of personal data. But GDPR only requires \u201cappropriate measures\u201d leaving room for interpretation. That is until a problem arises, and a judge vets the systems to decide whether existing measures were \u201cappropriate\u201d.<\/li>\n\n\n<li>Additionally, a company that holds information of any kind, be it personal data as defined by GDPR or sensitive data such as a list of receivables with their details, has every reason to ensure that such data is not accessible to unauthorized parties. Reputation is at stake.<\/li>\n\n<\/ul>\n\n\n\n<p>\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How does TCM ensure that its systems are safe?<\/h4>\n\n\n\n<p>\u00a0<strong><u>Cloud based<\/u><\/strong>TCM Belgium\u2019s information technology is cloud based since 2014.\u00a0 This was a significant step forward in terms of availability and security. Prior to 2014, we experienced some problems (not linked to privacy though) due to the malfunction of our own servers.\u00a0 Since 2014, we have had continued access (no downtime except when internet or electricity is down, being a couple of hours a year).\u00a0 We have had no security alert. Indeed, configuring cloud computing is a matter for specialists but such systems are more sophisticated than what a smallish company can offer with its own servers. Hence the resulting tool is much safer in many aspects. \u00a0<strong><u>Back Up<\/u><\/strong>In the past, we needed to take removable back ups home every night. This was inconvenient and never fully efficient as reconstruction based on a back up was an adventure.\u00a0 Now we have professional back up\u2019s designed by a Cloud provider. \u00a0<strong><u>Debt collection data<\/u><\/strong>Since 2014, your claims, our actions, the debtor\u2019s debts and payments, are all stored on Amazon Web Services (<a href=\"https:\/\/aws.amazon.com\/\" target=\"_blank\" rel=\"noopener\">AWS<\/a>). The systems we use to access that data is maintained and continuously developed by a specialist :<a href=\"https:\/\/easi.net\/en\" target=\"_blank\" rel=\"noopener\">EASI<\/a>. This configuration means that our clients have access to their claims and statistics through their internet browser.\u00a0 It also means that they can exchange messages with us, with full GDPR compliant privacy, through this web-based platform. The system is regularly tested for uninvited penetration. No significant threat has been detected and even minor issues are fixed. The system is protected by specific security software layers (<a href=\"https:\/\/www.f5.com\/products\/security\/advanced-waf\" target=\"_blank\" rel=\"noopener\">F5<\/a>&#8211; Web Application Firewall). \u00a0<strong><u>E-mail traffic<\/u><\/strong>For 10 years, our e-mail traffic has flowed through the<a href=\"https:\/\/products.office.com\/en\/home?omkt=en&amp;rtc=1\" target=\"_blank\" rel=\"noopener\">Office365<\/a>platform from Microsoft. We sometimes have minor issues, but we experience the exceptionally fast, efficient and friendly support from Microsoft.\u00a0 Needless to say: it is quite securely built. We have not had any issue with loss of data or security breaches. On top of this service, we have added a specific and dedicated layer of software (EASI<a href=\"https:\/\/easi.net\/en\/solutions\/security\" target=\"_blank\" rel=\"noopener\">AntiSpam<\/a>-as-a-Service) to filter spams addressed to us.\u00a0 The purpose is to avoid the risk of clicking on malicious links. \u00a0<strong><u>Personal PC and malicious threats<\/u><\/strong>Everyone at TCM has his own laptop (Surface Pro).\u00a0 They are not organised on a network whatsoever.\u00a0 They can connect from home or from anywhere in the world (and can use their office phone from any place). This entails great flexibility but also threats. We therefore installed the powerful<a href=\"https:\/\/www.sentinelone.com\/\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a>security system.\u00a0 This is not only a virus threat protection, but a full pc security tool based on artificial intelligence. It analyses the pc\u2019s activity and detects unexpected action. And in case it fails to block a virus, it can roll back the pc\u2019s systems to the last safe situation. \u00a0<strong><u>Passwords<\/u><\/strong>The most common method for fraudulent access to data is by using a regular user password.\u00a0 For this reason, we installed<a href=\"https:\/\/www.dashlane.com\/\" target=\"_blank\" rel=\"noopener\">Dashlane<\/a>for every TCM colleague.\u00a0 Dashlane is a password vault and a password generator.\u00a0 It includes useful tools (like automated login and password sharing).\u00a0 But the main benefit is for us all to have complex and different passwords for each application and to change them regularly. \u00a0<strong><u>Conclusion<\/u><\/strong>We all know that there is no system that is 100% safe. This was true in the 19th century paper and metal vaults world. It remains true in the 21st century of data encryption. At TCM we think that we have adequate measures in place to keep our client\u2019s and debtors\u2019 data safe. As it is an ongoing problem, we will keep maintaining our systems and will install new ones when necessary.<a href=\"https:\/\/tcm.be\/en\/services\/data-processing\/\">Read more<\/a>on our IT tools. Questions?\u00a0<a href=\"https:\/\/tcm.be\/en\/contact\/\">Please contact us<\/a>. February 2020<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/imgi_31_SecurityArticle_small-400x250-1-150x150.jpg\" alt=\"Security computing\" class=\"wp-image-9336\" title=\"\"><\/figure>\n\n\n\n<p>Recent events have reminded us that companies\u2019 software and data processing systems need to be maintained and monitored for security.\u00a0 Debt collection has to do with people\u2019s wallets, which requires discretion.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>The law, including GDPR, imposes security measures to avoid leakage of personal data. But GDPR only requires \u201cappropriate measures\u201d leaving room for interpretation. That is until a problem arises, and a judge vets the systems to decide whether existing measures were \u201cappropriate\u201d.<\/li>\n\n\n<li>Additionally, a company that holds information of any kind, be it personal data as defined by GDPR or sensitive data such as a list of receivables with their details, has every reason to ensure that such data is not accessible to unauthorized parties. Reputation is at stake.<\/li>\n\n<\/ul>\n\n\n\n<p>\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How does TCM ensure that its systems are safe?<\/h4>\n\n\n\n<p>\u00a0<strong><u>Cloud based<\/u><\/strong>TCM Belgium\u2019s information technology is cloud based since 2014.\u00a0 This was a significant step forward in terms of availability and security. Prior to 2014, we experienced some problems (not linked to privacy though) due to the malfunction of our own servers.\u00a0 Since 2014, we have had continued access (no downtime except when internet or electricity is down, being a couple of hours a year).\u00a0 We have had no security alert. Indeed, configuring cloud computing is a matter for specialists but such systems are more sophisticated than what a smallish company can offer with its own servers. Hence the resulting tool is much safer in many aspects. \u00a0<strong><u>Back Up<\/u><\/strong>In the past, we needed to take removable back ups home every night. This was inconvenient and never fully efficient as reconstruction based on a back up was an adventure.\u00a0 Now we have professional back up\u2019s designed by a Cloud provider. \u00a0<strong><u>Debt collection data<\/u><\/strong>Since 2014, your claims, our actions, the debtor\u2019s debts and payments, are all stored on Amazon Web Services (<a href=\"https:\/\/aws.amazon.com\/\" target=\"_blank\" rel=\"noopener\">AWS<\/a>). The systems we use to access that data is maintained and continuously developed by a specialist :<a href=\"https:\/\/easi.net\/en\" target=\"_blank\" rel=\"noopener\">EASI<\/a>. This configuration means that our clients have access to their claims and statistics through their internet browser.\u00a0 It also means that they can exchange messages with us, with full GDPR compliant privacy, through this web-based platform. The system is regularly tested for uninvited penetration. No significant threat has been detected and even minor issues are fixed. The system is protected by specific security software layers (<a href=\"https:\/\/www.f5.com\/products\/security\/advanced-waf\" target=\"_blank\" rel=\"noopener\">F5<\/a>&#8211; Web Application Firewall). \u00a0<strong><u>E-mail traffic<\/u><\/strong>For 10 years, our e-mail traffic has flowed through the<a href=\"https:\/\/products.office.com\/en\/home?omkt=en&amp;rtc=1\" target=\"_blank\" rel=\"noopener\">Office365<\/a>platform from Microsoft. We sometimes have minor issues, but we experience the exceptionally fast, efficient and friendly support from Microsoft.\u00a0 Needless to say: it is quite securely built. We have not had any issue with loss of data or security breaches. On top of this service, we have added a specific and dedicated layer of software (EASI<a href=\"https:\/\/easi.net\/en\/solutions\/security\" target=\"_blank\" rel=\"noopener\">AntiSpam<\/a>-as-a-Service) to filter spams addressed to us.\u00a0 The purpose is to avoid the risk of clicking on malicious links. \u00a0<strong><u>Personal PC and malicious threats<\/u><\/strong>Everyone at TCM has his own laptop (Surface Pro).\u00a0 They are not organised on a network whatsoever.\u00a0 They can connect from home or from anywhere in the world (and can use their office phone from any place). This entails great flexibility but also threats. We therefore installed the powerful<a href=\"https:\/\/www.sentinelone.com\/\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a>security system.\u00a0 This is not only a virus threat protection, but a full pc security tool based on artificial intelligence. It analyses the pc\u2019s activity and detects unexpected action. And in case it fails to block a virus, it can roll back the pc\u2019s systems to the last safe situation. \u00a0<strong><u>Passwords<\/u><\/strong>The most common method for fraudulent access to data is by using a regular user password.\u00a0 For this reason, we installed<a href=\"https:\/\/www.dashlane.com\/\" target=\"_blank\" rel=\"noopener\">Dashlane<\/a>for every TCM colleague.\u00a0 Dashlane is a password vault and a password generator.\u00a0 It includes useful tools (like automated login and password sharing).\u00a0 But the main benefit is for us all to have complex and different passwords for each application and to change them regularly. \u00a0<strong><u>Conclusion<\/u><\/strong>We all know that there is no system that is 100% safe. This was true in the 19th century paper and metal vaults world. It remains true in the 21st century of data encryption. At TCM we think that we have adequate measures in place to keep our client\u2019s and debtors\u2019 data safe. As it is an ongoing problem, we will keep maintaining our systems and will install new ones when necessary.<a href=\"https:\/\/tcm.be\/en\/services\/data-processing\/\">Read more<\/a>on our IT tools. Questions?\u00a0<a href=\"https:\/\/tcm.be\/en\/contact\/\">Please contact us<\/a>. February 2020<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Recent events have reminded us that companies\u2019 software and data processing systems need to be maintained and monitored for security.\u00a0 Debt collection has to do with people\u2019s wallets, which requires discretion. \u00a0 How does TCM ensure that its systems are safe? \u00a0Cloud basedTCM Belgium\u2019s information technology is cloud based since 2014.\u00a0 This was a significant [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":["post-71282","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/posts\/71282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/comments?post=71282"}],"version-history":[{"count":1,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/posts\/71282\/revisions"}],"predecessor-version":[{"id":72041,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/posts\/71282\/revisions\/72041"}],"wp:attachment":[{"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/media?parent=71282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/categories?post=71282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tcm.be\/en\/wp-json\/wp\/v2\/tags?post=71282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}