Compliance, Training & Tenacity

Achieving compliance excellence through secure, reliable, and trusted data protection standards for more than a decade.

Tailored, comprehensive top-tier services

You are Safe with SCM

SCM proudly holds the SOC 2 Type II certification, meeting top standards in all five trust service criteria, ensuring the highest level of security and operational integrity for our clients.

SOC 2 Type II Certification: Ensuring Security, Privacy, and Integrity

Features and Benefits:

Security

SCM’s systems are rigorously protected from unauthorized access through advanced physical and logical security measures, safeguarding sensitive data and maintaining robust defenses against potential threats.

Availability

Our systems are designed for optimal uptime, ensuring that services remain available and accessible as per agreed service-level commitments, minimizing disruptions for our clients.

Processing Integrity

SCM ensures the accuracy, completeness, timeliness, and authorization of all system processes, guaranteeing the integrity of data processing and delivering reliable outcomes for every transaction.

Confidentiality

All confidential information is treated with the highest level of protection, in full compliance with confidentiality agreements, ensuring sensitive data remains secure.

Privacy

SCM collects and processes personal information in strict adherence to our privacy policy, fully aligned with the privacy principles outlined by the American Institute of Certified Public Accountants (AICPA). Our continuous SOC 2 Type II certification is a testament to our unwavering commitment to upholding the highest standards of security, availability, processing integrity, confidentiality, and privacy, providing our clients with the confidence they deserve. Licensing, Security, and Compliance Excellence at SCM

Fully Licensed and Insured Recovery Agents

SCM and all affiliated recovery agents are fully licensed and insured in accordance with state regulations, ensuring that our services meet the highest legal standards for every jurisdiction we operate in.

Top-Tier Data Security

At SCM, we prioritize the security of your sensitive data. We implement stringent security measures, including controlled access buildings, end-to-end encrypted data transfers, and multiple levels of data access controls, to protect personal and confidential information from unauthorized access.

Data Redundancy for Maximum Uptime

SCM utilizes redundant data systems and sources to ensure that your information remains protected and accessible, even during unexpected events. Our commitment to minimizing downtime ensures 24/7 availability of account data for both clients and agents without interruption.

Robust Network Security

Network security is a cornerstone of SCM’s operational integrity. Beyond annual third-party penetration testing and certifications, we conduct quarterly in-house penetration tests to continually safeguard our network from potential vulnerabilities and cyber threats.

Strict Compliance with Industry Standards

SCM is dedicated to upholding the highest compliance standards for our clients. We provide rigorous third-party vendor oversight, on-site inspections, and continuous employee education in partnership with RISC (www.riscus.com). RISC monitors and maintains all compliance documentation, ensuring that vendors meet SCM’s strict requirements, including background checks, document tracking, and compliance verification.

Our Comprehensive Compliance Portfolio Includes:

  • SCM’s RISC Pro Membership and ongoing monitoring of compliance in the recovery industry
  • Continuous vetting of third party vendors documentation by RISC, ensuring compliance
  • Annual on-site inspections of vendors with detailed, standardized reports
  • RISC manages the remediation of failed vendors inspections and provides remedies to assure compliance
  • Staff certification through the CARS-Financial Client National Course to ensure up-to-date knowledge on collateral recovery regulations and best practices

At SCM, we provide the highest levels of security, redundancy, and compliance, ensuring your data and business operations are always protected, accessible, and legally sound.

Business News, Industry Insights & Expert Perspectives

Scroll to Top