Businesses and collectors have the added challenge of trying to contact customers or debtors who may only use cell phones, have given up their land line phones and that use email, instant messages, social media websites and text messages as their primary form of communications.
In this e-book, Using Social Media in Collections, the risks, laws, & mistakes you will learn how you can use social media web sites and new technology to maintain a good customer base, keep good paying customers on track, locate, verify, analyze and utilize in order to collect. Learn how these popular social networking websites can help improve your collections and what some of the most common mistakes are when using these social websites and how you can avoid them.
Online collection techniques involve locating debtors through skip tracing and social networks like Facebook and LinkedIn to collect debts. Collectors can accept online payments through credit cards, PayPal, and ACH. All major credit bureaus offer online credit reporting and detailed debtor information. Collectors must be careful not to excessively contact debtors through emails, texts, or social media, as that could constitute harassment and result in fines or loss of credibility.
Identity Fraud and How to Protect YourselfBarry Caplin
Identity theft occurs when someone steals personal information such as social security numbers, bank account numbers, or credit card numbers from another person and uses that information without permission to commit fraud or theft. Common ways identity thieves get personal information include stealing wallets and mail, hacking computers, and "phishing" scams. If you believe you are a victim of identity theft, you should contact one of the three major credit bureaus, close any fraudulent accounts, file a police report, and file an identity theft complaint with the Federal Trade Commission. There are also steps you can take to protect yourself such as shredding documents with personal information, being cautious about sharing information online and over the phone, and monitoring credit reports and bank statements
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
Canada's Anti-Spam Legislation: What Nonprofits Need to Know Before July 1, 2...TechSoup Canada
This document provides an overview of Canada's Anti-Spam Legislation (CASL) and its requirements for charities and not-for-profits regarding Commercial Electronic Messages (CEMs). Key points include: CASL regulates online activities including CEMs and requires express or implied consent to send CEMs; charities and not-for-profits often send CEMs like donation requests that require compliance; there is an exemption for CEMs sent by registered charities where the primary purpose is raising funds; consent requirements, information that must be included in CEMs like contact details and unsubscribe options, and exemptions are outlined; charities have until July 2017 for implied consent from existing donors/members
Ethical social media marketing for lawyers june 20Natalie Alesi
The document summarizes a presentation on ethical social media marketing for lawyers. It discusses which social media platforms lawyers should focus on, including LinkedIn, Twitter, Facebook, and Google+. It also covers social media scheduling tools and ethics considerations for lawyers using social media, such as not making misleading statements or characterizing the quality of services. The presentation provides tips on optimizing profiles, examples of what lawyers are doing in 2013, and references various ethics rules and opinions.
Online collection techniques involve locating debtors through skip tracing and social networks like Facebook and LinkedIn to collect debts. Collectors can accept online payments through credit cards, PayPal, and ACH. All major credit bureaus offer online credit reporting and detailed debtor information. Collectors must be careful not to excessively contact debtors through emails, texts, or social media, as that could constitute harassment and result in fines or loss of credibility.
Identity Fraud and How to Protect YourselfBarry Caplin
Identity theft occurs when someone steals personal information such as social security numbers, bank account numbers, or credit card numbers from another person and uses that information without permission to commit fraud or theft. Common ways identity thieves get personal information include stealing wallets and mail, hacking computers, and "phishing" scams. If you believe you are a victim of identity theft, you should contact one of the three major credit bureaus, close any fraudulent accounts, file a police report, and file an identity theft complaint with the Federal Trade Commission. There are also steps you can take to protect yourself such as shredding documents with personal information, being cautious about sharing information online and over the phone, and monitoring credit reports and bank statements
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
Canada's Anti-Spam Legislation: What Nonprofits Need to Know Before July 1, 2...TechSoup Canada
This document provides an overview of Canada's Anti-Spam Legislation (CASL) and its requirements for charities and not-for-profits regarding Commercial Electronic Messages (CEMs). Key points include: CASL regulates online activities including CEMs and requires express or implied consent to send CEMs; charities and not-for-profits often send CEMs like donation requests that require compliance; there is an exemption for CEMs sent by registered charities where the primary purpose is raising funds; consent requirements, information that must be included in CEMs like contact details and unsubscribe options, and exemptions are outlined; charities have until July 2017 for implied consent from existing donors/members
Ethical social media marketing for lawyers june 20Natalie Alesi
The document summarizes a presentation on ethical social media marketing for lawyers. It discusses which social media platforms lawyers should focus on, including LinkedIn, Twitter, Facebook, and Google+. It also covers social media scheduling tools and ethics considerations for lawyers using social media, such as not making misleading statements or characterizing the quality of services. The presentation provides tips on optimizing profiles, examples of what lawyers are doing in 2013, and references various ethics rules and opinions.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Sherry Hunt was a longtime employee of Citigroup who strictly followed rules and ethics. However, she disagreed with the company's new loose credit policies that approved risky loans without proper documentation. When Hunt refused to approve loans without the required HUD-1 form, her decisions were overruled. Feeling ignored and that the compensation system rewarded approving risky loans, Hunt began to consider reporting the violations she witnessed under the Dodd Frank Act. She valued making ethical decisions and addressing problems at the company.
Social media background checks policy developmentMike McCarty
Social Media has exploded in recent years and employers realize that social media background checks should be an important part of their hiring process. However, this can be a legal minefield. Join Safe Hiring Solutions CEO and attorney Steve Koers for a look at social media background checks policy development.
The document provides instructions for signing up for a LinkedIn account and customizing your profile. It outlines 4 steps to sign up: entering information, confirming via email, choosing an account type, and receiving an email confirmation. It then details how to customize your profile by editing sections like work history, education, and connections. The document also gives tips for searching for connections by email, name, or company and accepting connection requests.
Employee Misuse of Internet and BlogosphereKelly Savage
The document provides guidance to employers on managing risks associated with employee misuse of email, blogs, and the internet. It finds that over 25% of employers have fired workers for email misuse. The risks to employers include legal liability, loss of productivity, and harm to reputation. The document recommends that employers implement and enforce clear, written policies on appropriate technology use and monitor employee activity to prevent issues like sharing confidential information or engaging in discrimination. Employers are also advised to respond quickly to any inappropriate use discovered.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This document discusses managing internet misuse in the workplace. It notes that over 25% of employers have fired employees for misuse of email and internet and over 50% have disciplined employees for violating email policies. It recommends that employers implement and publish internet and email use policies, monitor usage, and respond consistently to violations. The policies should restrict use to business communications, prohibit inappropriate content, and inform employees that there is no expectation of privacy on the company's systems.
Learn how financial services professionals can leverage LinkedIn to develop new business opportunities, build relationships, and drive revenue in a compliant manner with Proofpoint.
Steps for registration of Independent Director by Company. Pictorial representation prepared by CS RAJESH LAHHWANI.
A detail guide and can be used for reference only.
PS: Ownership of document lies with CS Rajesh only. Here it is uploaded for reference and education purpose only.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A lottery scam begins with an unexpected notification that the recipient has won a large sum of money in a lottery. However, the scam involves requesting processing fees or transfer charges from the target before they can receive the winnings, which they never do. Lottery scams often use names of legitimate organizations but are not actually affiliated with them. Unless someone has bought a ticket, they cannot have won a prize, and legitimate lotteries do not require fees to be paid upfront. Scammers may escalate efforts to obtain more money by posing as authorities investigating the original scam.
Worcester County Bar Association Presents The LinkedIn LawyerDavid Barrett
The WCBA Law Office Technology Section presents "The LinkedIn Lawyer"
Thursday, April 8, 2010
4:00pm - 6:30pm
Worcester District Registry of Deeds Commonwealth Room
90 Front Street
Worcester, MA
David will demonstrate how the use of social media tools like Linkedin, Facebook, Twitter and legal blawging may enhance your legal practice. Topics will include: Generating legal referrals with social media, social media and legal ethics and social media for the busy professional.
$10.00 for WCBA Members
$40.00 for Non-Member
Seating is limited so please register in advance by contacting the WCBA office at 508-752-1311. Door registration will be accepted.
For questions please contact the Worcester County Bar Association, 19 Norwich Street, Worcester, MA 01608.
Do not create your own marketing materials, use company trademarks, or join more than once without approval. Do not promise special privileges or make income or health claims when recruiting others. Each person must sign up for themselves without providing sensitive information. There are two ways for others to sign up - entering the sponsor ID manually or using a personalized link with the ID pre-filled.
The basics for building one's legal practice using (among other social networking tools) TWITTER for the Cool Twitter Conference in Los Angeles at the House of Blues
Debt Collectors And Banks Follow You On Facebook, Twitterbdbennett001
Debt collectors and banks have begun using social media like Facebook and Twitter to locate debtors and find new business opportunities. However, regulators are concerned this could cross into stalking or harassment. The CFPB and FTC are examining how or if debt collectors should be allowed to contact people through social media. They want public input on what rules should apply regarding social media use by both debt collectors and financial institutions.
The financial economy has been known to be uncertain and the introduction of payday loans has made this the economy more uncertain which was clearly not the intent of the people behind their inception.
http://www.trueblueloans.co.uk
The document discusses various types of fraud that occur on the internet, including fraudulent promotions on electronic bulletin boards, disguised advertising in discussion groups, e-mail scams involving worthless products and pyramid schemes, risky investment opportunities and stock manipulations. It provides tips for protecting yourself such as being wary of sites you are unfamiliar with, not revealing personal financial information online unless you are sure where it is going, and knowing the company you plan to do business with. Consumers should report any suspected fraudulent activity to organizations like the National Fraud Information Center.
Brokers have carried their notorious reputation in the financial world, wherever they have gone and this doesn’t stop with payday lending.
http://www.pacific-odyssey.co.uk
The Practicing Lawyers Guide To Social Mediajlipsey
This document provides an overview of lawyers' use of social media and emerging legal issues related to social media. It discusses trends in social media use among various groups. It also summarizes research on lawyers' growing participation in social networks like LinkedIn and interest in private legal networks. Additionally, it outlines some of the ethical considerations, privacy issues, and potential legal risks related to activities on social media sites.
The document provides an overview of the Receivable Management Services (RMS) 3rd Party/Financial Services team. It details the team's four-step training process of telling, showing, doing, and reviewing tasks. It also outlines the team's expectations for employees to always put in their best effort and act legally, morally, and ethically. The document then provides context about the role of debt collection and describes how the RMS team specializes in collecting credit card debts. It discusses the differences between personal and business credit cards. It also reviews relevant debt collection law, including the Fair Debt Collection Practices Act, and provides an organizational chart of how credit card accounts may be placed with a debt collection agency.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Sherry Hunt was a longtime employee of Citigroup who strictly followed rules and ethics. However, she disagreed with the company's new loose credit policies that approved risky loans without proper documentation. When Hunt refused to approve loans without the required HUD-1 form, her decisions were overruled. Feeling ignored and that the compensation system rewarded approving risky loans, Hunt began to consider reporting the violations she witnessed under the Dodd Frank Act. She valued making ethical decisions and addressing problems at the company.
Social media background checks policy developmentMike McCarty
Social Media has exploded in recent years and employers realize that social media background checks should be an important part of their hiring process. However, this can be a legal minefield. Join Safe Hiring Solutions CEO and attorney Steve Koers for a look at social media background checks policy development.
The document provides instructions for signing up for a LinkedIn account and customizing your profile. It outlines 4 steps to sign up: entering information, confirming via email, choosing an account type, and receiving an email confirmation. It then details how to customize your profile by editing sections like work history, education, and connections. The document also gives tips for searching for connections by email, name, or company and accepting connection requests.
Employee Misuse of Internet and BlogosphereKelly Savage
The document provides guidance to employers on managing risks associated with employee misuse of email, blogs, and the internet. It finds that over 25% of employers have fired workers for email misuse. The risks to employers include legal liability, loss of productivity, and harm to reputation. The document recommends that employers implement and enforce clear, written policies on appropriate technology use and monitor employee activity to prevent issues like sharing confidential information or engaging in discrimination. Employers are also advised to respond quickly to any inappropriate use discovered.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This document discusses managing internet misuse in the workplace. It notes that over 25% of employers have fired employees for misuse of email and internet and over 50% have disciplined employees for violating email policies. It recommends that employers implement and publish internet and email use policies, monitor usage, and respond consistently to violations. The policies should restrict use to business communications, prohibit inappropriate content, and inform employees that there is no expectation of privacy on the company's systems.
Learn how financial services professionals can leverage LinkedIn to develop new business opportunities, build relationships, and drive revenue in a compliant manner with Proofpoint.
Steps for registration of Independent Director by Company. Pictorial representation prepared by CS RAJESH LAHHWANI.
A detail guide and can be used for reference only.
PS: Ownership of document lies with CS Rajesh only. Here it is uploaded for reference and education purpose only.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A lottery scam begins with an unexpected notification that the recipient has won a large sum of money in a lottery. However, the scam involves requesting processing fees or transfer charges from the target before they can receive the winnings, which they never do. Lottery scams often use names of legitimate organizations but are not actually affiliated with them. Unless someone has bought a ticket, they cannot have won a prize, and legitimate lotteries do not require fees to be paid upfront. Scammers may escalate efforts to obtain more money by posing as authorities investigating the original scam.
Worcester County Bar Association Presents The LinkedIn LawyerDavid Barrett
The WCBA Law Office Technology Section presents "The LinkedIn Lawyer"
Thursday, April 8, 2010
4:00pm - 6:30pm
Worcester District Registry of Deeds Commonwealth Room
90 Front Street
Worcester, MA
David will demonstrate how the use of social media tools like Linkedin, Facebook, Twitter and legal blawging may enhance your legal practice. Topics will include: Generating legal referrals with social media, social media and legal ethics and social media for the busy professional.
$10.00 for WCBA Members
$40.00 for Non-Member
Seating is limited so please register in advance by contacting the WCBA office at 508-752-1311. Door registration will be accepted.
For questions please contact the Worcester County Bar Association, 19 Norwich Street, Worcester, MA 01608.
Do not create your own marketing materials, use company trademarks, or join more than once without approval. Do not promise special privileges or make income or health claims when recruiting others. Each person must sign up for themselves without providing sensitive information. There are two ways for others to sign up - entering the sponsor ID manually or using a personalized link with the ID pre-filled.
The basics for building one's legal practice using (among other social networking tools) TWITTER for the Cool Twitter Conference in Los Angeles at the House of Blues
Debt Collectors And Banks Follow You On Facebook, Twitterbdbennett001
Debt collectors and banks have begun using social media like Facebook and Twitter to locate debtors and find new business opportunities. However, regulators are concerned this could cross into stalking or harassment. The CFPB and FTC are examining how or if debt collectors should be allowed to contact people through social media. They want public input on what rules should apply regarding social media use by both debt collectors and financial institutions.
The financial economy has been known to be uncertain and the introduction of payday loans has made this the economy more uncertain which was clearly not the intent of the people behind their inception.
http://www.trueblueloans.co.uk
The document discusses various types of fraud that occur on the internet, including fraudulent promotions on electronic bulletin boards, disguised advertising in discussion groups, e-mail scams involving worthless products and pyramid schemes, risky investment opportunities and stock manipulations. It provides tips for protecting yourself such as being wary of sites you are unfamiliar with, not revealing personal financial information online unless you are sure where it is going, and knowing the company you plan to do business with. Consumers should report any suspected fraudulent activity to organizations like the National Fraud Information Center.
Brokers have carried their notorious reputation in the financial world, wherever they have gone and this doesn’t stop with payday lending.
http://www.pacific-odyssey.co.uk
The Practicing Lawyers Guide To Social Mediajlipsey
This document provides an overview of lawyers' use of social media and emerging legal issues related to social media. It discusses trends in social media use among various groups. It also summarizes research on lawyers' growing participation in social networks like LinkedIn and interest in private legal networks. Additionally, it outlines some of the ethical considerations, privacy issues, and potential legal risks related to activities on social media sites.
The document provides an overview of the Receivable Management Services (RMS) 3rd Party/Financial Services team. It details the team's four-step training process of telling, showing, doing, and reviewing tasks. It also outlines the team's expectations for employees to always put in their best effort and act legally, morally, and ethically. The document then provides context about the role of debt collection and describes how the RMS team specializes in collecting credit card debts. It discusses the differences between personal and business credit cards. It also reviews relevant debt collection law, including the Fair Debt Collection Practices Act, and provides an organizational chart of how credit card accounts may be placed with a debt collection agency.
Brokers have carried their notorious reputation in the financial world, wherever they have gone and this doesn’t stop with payday lending. Brokers, in general are considered less trustworthy and a more risky affair as compared to dealing directly with financial institutions.
Visit us: www.pacific-odyssey.co.uk
How to identify potential customers for bad debts?Debt Nirvana
Hiring a debt collection agency can prove highly effective in recovering outstanding debts for businesses facing challenges with non-payment. Specializing in the intricacies of debt collection, these agencies implement proven processes and provide their agents with advanced tools and training, significantly increasing the likelihood of successful debt recovery. As the success of debt collection is influenced by factors like time, skill, and reputation, outsourcing to a collection agency often results in a higher collection rate compared to internal efforts. With expertise in navigating legal frameworks and employing diplomatic techniques, collection agencies reduce legal risks and can negotiate with borrowers in ways that may be challenging for original creditors. While there may be upfront costs, the net positive transaction potential and the absence of charges for unsuccessful attempts make debt collection agencies a strategic and cost-effective solution for businesses. For professional debt recovery services, contact Debt Nirvana at +91-9810010294 or via email at rvm@debtnirvana.com. Take control of your financial recovery and trust the experts in debt collection.
The Corruption Perception Index (CPI) is an index published by Transparency International that ranks countries "by their perceived levels of public sector corruption, as determined by expert assessments and opinion surveys." The 2021 index found that the five least corrupt countries were Denmark, Finland, New Zealand, Norway, and Singapore, while the five most corrupt were South Sudan, Syria, Somalia, Yemen, and Venezuela. The CPI is used to measure a country's integrity and identify areas for reform related to corruption.
The Corruption Perception Index (CPI) is an index published by Transparency International that ranks countries "by their perceived levels of public sector corruption, as determined by expert assessments and opinion surveys." The 2021 index found that the five least corrupt countries were Denmark, Finland, New Zealand, Norway, and Singapore, while the five most corrupt were South Sudan, Syria, Somalia, Yemen, and Venezuela. The CPI is used to assess a country's integrity and identify areas for reform related to corruption.
Overdraft protection services, credit cards, and predatory loans can all function as debt traps that are difficult to escape. Overdraft fees accumulate quickly, while credit cards charge numerous fees and interest that compound costs. Borrowing to pay existing loans often results in deeper debt over time, especially with short loan terms and high interest rates. To avoid debt traps, people should be aware of excessive fees, use credit cards mindfully, and avoid taking out new loans only to pay off old ones. Performance Settlement offers debt resolution services to help clients struggling financially pay off creditors.
Managing Social Media in the WorkplaceEric Swenson
The impact of social media in the workplace is growing. Time is being wasted, employees are 'friending' each other and liability for these issues is a litigation attorney's dream come true.
Here's how to develop a social media policy and examine the impact - from legal issues, to morale, to productivity.
Managing Social Media in the WorkplaceEric Swenson
The impact of social media in the workplace is growing. Time is being wasted, employees are 'friending' each other and liability for these issues is a litigation attorney's dream come true.
Social networking tools are used by advertisers and marketers, by human resources departments, and of course by job-seekers and employees.
For many companies, the question now is not whether to use social media in its business, but how.
And as with any new aspect of doing business, there are several potential pitfalls that a company must be aware of to avoid running into legal difficulties.
Social media provides opportunities and ethics concerns for legal professionals. It allows attorneys to network, gain knowledge, and market their practice, but they must be careful not to form attorney-client relationships online or reveal confidential information. Attorneys should control their online presence by developing consistent profiles and monitoring what clients and the public see. They also need policies for firm employees' social media use and should educate clients and staff on related risks.
This document provides information on various consumer issues that are important for seniors and caregivers to be aware of, including saving important paperwork, credit issues, debt collection, medical debt, debt relief services, bankruptcy, co-signing loans, payday loans, and ambulance bills. It discusses key rights and protections under laws like the Fair Credit Reporting Act, Fair Debt Collection Practices Act, and issues to consider when dealing with debts, creditors, and collection agencies.
Payday UK is one company that is considered as one of the most premium payday lenders in the world. They are one such company that have been instrumental in understanding the need of borrowers and arriving at methods to be able to tackle the problems that most of the borrowers are facing today. http://www.pacific-odyssey.co.uk/
This document provides guidance on effective credit management strategies. It outlines key steps like establishing clear credit policies, checking references for new customers, extending credit judiciously by setting limits, and following up promptly on past due accounts. The objectives of credit management are to minimize risks, eliminate bad debt, and collect money owed by being fair but also enforcing policies. When customers are late on payments, the document advises referring to the credit policy, making collection calls, and potentially revoking their credit if needed. Resources for free credit applications and information on debt collection laws are also referenced.
Understanding The Fair Debt Collection Practices ActMichelle Dunn
The Fair Debt Collection Practices Act (FDCPA) regulates how third party debt collectors contact consumers regarding debts. According to the FTC, complaints against in-house collectors increased from 26,652 in 2008 to 32,076 in 2009. The FDCPA only applies to consumer debts such as credit cards, medical bills, and mortgages collected by third parties, not original creditors. It requires collectors to identify themselves, provide debt validation, and limits contacting consumers at work or inappropriate times.
This document provides guidance on effective credit management strategies for businesses. It outlines key steps like establishing clear credit policies, thoroughly checking customer references when extending credit, monitoring accounts receivable regularly, and using professional debt collection agencies when needed to recover past due amounts. The goal is to maximize collections while minimizing bad debt by taking a proactive approach to credit risk assessment and payment follow-up.
This document discusses best practices for using email in customer communications and collections while complying with relevant laws and privacy regulations. It covers obtaining consent, verifying addresses, avoiding confrontation, ensuring delivery and non-receipt claims are addressed. Specific topics covered include the types of email, laws around spam and privacy, protecting the business from risks, and using email invoicing and dunning services.
Creating A Credit Policy That Prevents Delinquent AccountsMichelle Dunn
Creating a credit policy involves gathering customer information through credit applications, determining criteria for extending credit, and setting terms, due dates, and penalties for late payments. The policy should limit risk by getting personal guarantees, deposits, or revoking credit for delinquent accounts. When customers are past due, the policy should outline organized steps like phone calls, reminders, and withholding sales commissions until accounts are paid in full.
Creating A Credit Policy That Prevents Delinquent Accounts
Using Social Media In Collections
1. Using Social Media in CollectionsPresented by Michelle Dunn The Risks, Laws & Mistakes made by collectors
2. Businesses and collectors have the added challenge of trying to contact customers or debtors who may only use cell phones, have given up their land line phones and that use email, instant messages, social media websites and text messages as their primary form of communications. In this presentation, Using Social Media in Collections, the risks, laws, & mistakes you will learn how you can use social media web sites and new technology to maintain a good customer base, keep good paying customers on track, locate, verify, analyze and utilize in order to collect. Learn how these popular social networking websites can help improve your collections and what some of the most common mistakes are when using these social websites and how you can avoid them. Technology has changed how we all communicate and do business.
3. Online collection techniques are skills and techniques used by collectors on the internet to locate debtors to try and collect on a debt. Just what are online collection techniques?
4. Utilizing social networking sites to gather information and investigate a person’s history requires a lot of work, and even when it is successful, it often will give you only a single chance at getting a payment. Finding debtors using social networking websites
5. If a debtor states that this is their preferred way of communication and provides you with their email address, just be sure to keep that information in writing on their file. Also, include the Mini Miranda if you are a third party collector at the end of each email message. Email using social networks
6. The Federal Trade Commission feels that if a third party becomes aware of a debt through any method, such as email or instant messaging, the collector is and will be held liable for violating Section 805(b) of the FDCPA. Instant messages
7. As a creditor text messages and emails seem to be the preferred and most effective way to increase collections. One company I know has experienced a 12 percent lift in communication by using text messages and email. It seems that email or a text message as an avenue of communication is perceived as less evasive than a phone call, and your customer has the sense of being in control of when and if they respond. Text messages
8. Some collectors advise consumers that ask to be contacted by email that they are not able to accommodate their request by law. If the collection issue is a commercial collection, many collectors will communicate via email since the Fair Debt Collection Practices Act does not apply. Commercial vs. Consumer debtors
9. Some collection attorney’s or process servers say they have used the pictures people post on FaceBook or MySpace to help them get a physical description of a person so they can serve them with legal paperwork. LocatingDebtors using Social Media
10. Facebook MySpace Twitter When you are checking out the profiles of people you are looking for, remember that they may have links on their social networking page to other websites or blogs they participate in that you can gather more information from. Popular Social Media Websites
11. Something to remember is that as a debt collector, you may not publicize a debt or discuss it with anyone else other than the debtor, their spouse and/or their attorney, so using a social network to communicate with a debtor would fall into this category. Contacting debtors using social networks
12. Dos & Don’ts of using Social media in collections Do’s Don’ts E-learning Skip tracing or locating debtors Accepting debtor payments Researching collection tools, such as software or skip tracing tools Credit reporting Use database technology to maintain account information on customers that owe you money Access consumer payments only with authorization for EACH specific payment or transaction Researching place of employment Emailing debtors about a debt if you are a third party collector Instant messaging a debtor about a debt Initiating more payments on a bank account when additional transactions have not been authorized. Sending debt collection emails, faxes or text messages Don’t send a “friend request” to a debtor on any social networking website
13. Proof of Delivery & Proof of Sale Statements & Invoices Dunning Notices When Congress enacted the FDCPA, it did not limit the methods a debt collector could use to contact a consumer except for prohibiting the use of postcards but this was before any new technology. However, it is important to remember that the FDCPA was enacted to prevent debt collectors from engaging in unfair, deceptive or abusive conduct in using any method to collect a debt. New technology raises questions and issues not considered when the FDCPA was enacted. The FDCPA applies to third party collectors, business owners should check their specific state laws to see what they can or cannot do. Many state laws mirror the FDCPA laws. Debt Verification
14. What you Can & Cannot do What you CAN do… What you CANNOT do… Locate or find someone Verify information Maintain account information Obtain employment or mailing information Never converse with a debtor using social media sites, utilizing the email feature or comment feature. Do not email a debtor about a debt if you think a third party can ever see that email. Do not instant message a debtor about a debt. If a debtor doesn’t respond to your email after authorizing you to email them, stop emailing and use traditional methods to try and collect, such as phone calls or letters. Do not send any communication that could be seen by a third party. Never “publish” a list of names of debtors anywhere online. Do not make false reports to a credit bureau. Do not use a fake name or company name. Do not request to be added as a “friend” by a debtor on a social networking site
15. These social media websites and networks are tools, just like a credit report is a tool to a collector. This information is to be used in order to collect a debt, and not for any other purpose and without contacting the debtor through that medium. Think of these sites as another form of verification of the information you already have. The risks of using social media as a collection tool
16. The FTC has concluded that major problems exist in the flow of information within the debt collection system and debt collection laws need to be modernized to take into account the changes in technology since the laws were put in place. Laws regarding Social Media and Debt Collection
17. When you use a social networking site to locate a debtor mail, there normally won’t be a problem. The problems arise when someone contacts a debtor through one of these social websites. Since the information, messages or conversations on these types of websites is not private and is available to many people to see, this would not be a tool to use in debt collection without violating federal laws specifically applicable to consumer debt collections. Better safe than sorry – don’t utilize the email tools on these websites to contact someone who owes money. You can run into legal problems and violate privacy laws. Common Mistakes
18. I recently took a poll of the top online methods collectors use as debt collection tools. The top 2 answers were: Accepting debtors payments online Staying away from using the internet until the laws are changed Top Methods
19. Birth date Address Employment information Asset information Things you can find posted on social networks that can help you as a collector
20. Everyone is doing it, this is one time when you should follow the pack and participate Listen, just like any networking event listen before you “talk” Track conversations with keywords, names, company names, executives names and use Google Reader and Google Blog Search (both free) to track them. Practice participating in social medias so you understand how they work. Many people, who might be a debtor, spend hours on these websites and know them inside and out. Social Media Success Tips
21. It’s a passing fad. Social media is here to stay and growing by the day. It is something you can control. Social media is controlled by the users, not the viewers, you can only control your reaction. It’s a one time set up. Once you create a profile or join a social media website, you cannot just set up a profile and leave it. You must be active and log into your account. Social media is something you have to work at and keep learning about for it to be effective for you. There are no rules. Some people believe they can do and say whatever they want without consequences. Though this may help you as a collector trying to locate debtors or businesses that owe money. Social Media Myths
22. Full 120 page February 2009 FTC Workshop Report: http://www.ftc.gov/bcp/workshops/debtcollection/dcwr.pdf Where collectors connect…online http://www.collectiontechnology.net/ American Credit & Collections Association Social network http://americancreditandcollections.ning.com RESOURCES for online collections
23. Online location or skip tracing websites Tweepz – online twitter search tool http://www.tweepz.com/ TweepSearch – another online twitter search tool http://tweepsearch.com/ Twellow – and yet another online twitter search tool http://www.twellow.com/ Public Records information www.publicrecordsinfo.com Public Records Finder www.publicrecordfinder.com Free Federal Court Dockets www.freecourtdockets.com Yahoo! People Search http://people.yahoo.com Find birthdates www.birthdatabase.com Better Business Bureau http://welcome.bbb.org Social Security Number Validator www.ssnvalidator.com County and ZIP code lookups www.usps.com/ncsc/lookups/lookup zip+4.html Search for blog posts www.whostalkin.com Search twitter postings http://search.twitter.com Search videos www.youtube.com www.searchvideo.org www.blinkx.com Find people www.zoominfo.com www.pipl.com www.zabasearch.com www.123people.com www.isearch.com
24. Skip tracing training: http://www.skiptraceconsultants.com American Credit & Collections Associations Collection Academy : http://www.credit-and-collections.com/pages/education.php Offering e-courses on Getting your customers to pay and the Fair Debt Collection Practices Act Training
25. Find anyone fast, easy to use guide to finding anyone anywhere, 3rd edition by Richard S. Johnson & Debra Johnson Knox, Private Investigators Naked in Cyberspace, how to find personal information online. The ultimate guide to what you can find out online about anyone. By Carole A. Kane, foreword by Beth Givens, Privacy Rights Clearinghouse Using Social Media in Collections e-book: http://www.michelledunn.com/shop/catalog.php?item=51 Online Collection Techniques: Do’s & Don’ts e-book : http://www.michelledunn.com/shop/catalog.php?item=49 Books
26. Michelle Dunn is an award winning author and columnist. She is the founder and CEO of the American Credit & Collections Association, one of the Top 5 women in Collections, and one of the Top 50 most influential collection professionals in her industry. Michelle has been quoted and featured in The Wall Street Journal, Smart Money Magazine, CNN & other National publications. In addition to writing and marketing her books, Michelle is a published columnist for 8 newspapers and national magazines including ‘Entrepreneur.com’ and “FIRST for Women” as well as an Editorial Advisor for “Collector Mentor” magazine and shares valuable credit & debt information with business owners on her blog. Strengthen your collections department with the titles in her “Collecting Money Series.” Visit www.michelledunn.com and www.credit-and-collections.com About Michelle Dunn