Adopting the Electronic Credit Application
|
|
- Bethanie Williams
- 5 years ago
- Views:
Transcription
1 Adopting the Electronic Credit Application With major advances in digital technology and a drive to reduce or eliminate paper as a vehicle to gather and store information related to credit and receivable management, CRF has had numerous inquiries pertaining to the adoption of the electronic credit application as a vehicle to enhance the new account management process. With the near universal acceptance of digital signatures and significant improvements in security related to digital transactions, the implementation of an electronic credit application process is beginning to make sense to a number of businesses throughout the country. An electronic credit application affords far greater accuracy, it significantly reduces the turnaround time in opening the new account, it eliminates the need to store cumbersome paper files and it affords the new account customer the convenience of filling out and submitting the credit application via the internet. The Credit Research Foundation With this in mind CRF has developed, for the benefit of its members, an interactive electronic credit application template in PDF format. This document allows for input of all pertinent credit information, as well as a facility for inserting digital signatures using Acrobat Reader. In addition to an overview of the electronic credit applications, this paper provides you a link to download the free electronic application template and provides instructions on how to create a digital signature using Acrobat Reader.
2 Processing the New Account The ultimate responsibility for the establishment of a new customer account rests with the credit department. It is therefore essential to set guidelines for performing the necessary procedure. The account must be precisely identified with its correct name and address. Additional identifiers may include a Social Security or government business identification number. for fast, accurate and easy identification. If new customer orders are to be prescreened for credit approval, it is necessary to describe, in a procedural document for the benefit of sales and credit personnel, the new account acceptance parameters. Necessary components of the new account application include: 1. Customer bill to name, street, city, state, zip 2. Customer ship to name, street, city, state, zip 3. Owners name (can be an individual, group or another company) 4. Telephone number 5. address 6. Legal characteristic -- sole ownership, partnership, corporation or other 7. Type of business -- example: distributor, retailer, wholesaler 8. Bank references: name, address, phone number, officer, type of account 9. Trade references: name, address, phone number 10. Year business started 11. Does the subject rent or own premises 12. Include a statement asking for sales and use tax exemption (resale certificate) to be mailed with the application 13. (For proprietorship) ask for the owner's Social Security # and a "signature/date block" asking their permission to order a personal credit bureau report 14. Request a blank copy of the customer's purchase order, front & back. (see "Customer Purchase Order" section). The Electronic Credit Application First impressions are important. Typically the first interaction a new customer has with your organization relates to the new account approval process. Therefore, your ability to quickly and efficiently respond to the customer s request for an open line of credit goes a long way in building a foundation for a long and prosperous business relationship. In the majority of states, digital signatures are now being recognized by our legal system. This, coupled with increased sophistication in Internet security, facilitates the use of an electronic credit application in today s business environment. Two elements that must be considered in credit decision making for the new account are time and costs. The practice of using an electronic credit application to gather critical decisioning data from the customer affords you the opportunity to respond to the customer s request for credit in as quickly as an hour, or less, particularly if an automated decisioning system is employed in the process. Costs associated with receiving an application are diminished considerably. The convenience factor for the customer in filling out and submitting the application via the Internet is also a major consideration. An electronic application can be structured to require that all fields are filled in prior to submission. This is something that can t be done with a paper application. With a complete application in hand, the analyst is positioned to make a quicker and more informed decision rather than having
3 to track down additional information required to fill in the blanks that might appear on the paper application. The sales rep is relieved of the responsibility of having to manage the new account application process. Additionally, information received on the account digitally can be stored digitally in an electronic file, thus relieving you of the burden of trying to manage paper files. The technology to process a request for credit has been in place for quite some time and is being used extensively in the world of B2C transactions. For a number of reasons, businesses doing business with business customers have been much slower to adopt the technology. In fact a survey conducted earlier this year pertaining to the use of online credit applications reveals that only 15% of businesses surveyed are actually employing the technology as a means to gather credit information on their B2B customers. A key reason why businesses have lagged behind in the adoption of the electronic credit application process in their B2B business activities relates to the fact that a typical business-tobusiness transaction represents a much larger dollar exposure and potential risk of loss. There is a sense that the potential for fraud in an online environment is greater and because since most states have their own set of laws pertaining to e-signatures, there is general insecurity over whether the customers e-signature on the application will stand a challenge in a particular state s court system. New Account Application Fraud While fraud is prevalent in the world of e-commerce, fraud is not limited to the Internet. It is important that the credit department use the same level of scrutiny on all requests for open lines of credit, whether electronic or paper based. If the request is made unsolicited, then one should consider sending the sales rep to the address on the credit application to confirm that the business is legitimate and the orders are valid. This practice also affords the sales rep the opportunity to establish an ongoing relationship with the new account customer. As is the case for all new account requests, the credit analyst should look for discrepancies amongst the tools employed in the decisioning process (i.e. the credit application, credit agency report, banking information, trade reference data, etc.). Things to look for include consistency in the name of the business and its principals names, coupled with consistency in address and phone numbers. The references on the application should be familiar to you. Consider the trade references: does their line of business coincide with that of the business applying for credit. If an ice cream shop is giving you a seafood wholesaler as a reference and your business sells fertilizer, then something should smell fishy. Different billing and shipping locations should also trigger a red flag. Digital Signatures The Electronic Signatures in Global and National Commerce Act was passed in This legislation controls the use of electronic signatures in conducting business on the Internet. The law prescribes the conditions necessary to make an electronic signature legally binding. It stipulates that electronic signatures are legal from the time the law was passed onward. It also prescribes that there is no legal difference between an electronic and a handwritten signature. Prior to the enactment of the E-sign Act of 2000, electronic signatures were being used, but when a dispute occurred, the signatures were not always recognized as legally binding in court situations since different states had different laws pertaining to e-signatures. Most states have now adopted the E-sign Act and accordingly are accepting digital signatures as legal. The federal
4 law also says that no state can favor a certain digital signature technology over another. This means a company that provides electronic signature capabilities cannot be mandated as the standard for a state or government entity. There are a number of software packages that can be used to create a valid digital signature. One example is Adobe Acrobat Reader, which can be downloaded to the PC free of charge. Using the software technology, a person can create a key that uniquely identifies that individual. The process of creating the key is relatively simple. Once established, the digital signature is affixed to the electronic document using the private key. The "signer" types in a password, similar to a personal identification number for an automatic teller machine. The private key then generates a long string of numbers and letters that represents the digital signature, or public key. The recipient of the message runs a software program using this public key to authenticate that the document was signed by the private key and that the document has not been altered during transmission. It is mathematically infeasible for a person to derive another person's private key. The only way to compromise a digital signature is to give another person access to the signature software and the password to the private key. We are in a world where paper is going away. Letters, books, documents, invoices and payments by paper check are all giving way to the digital age and digital files. How long the paper credit application prevails within your organization is heavily dependent upon your business model, your organizational culture and customer base. There is no doubt however that after serving us well for centuries the paper credit application will be going the way of the telegraph, phonograph, monochrome film, eight track tapes, etc. CRF has received numerous requests for information relative to electronic credit applications. Due to the significant interest expressed by CRF members, we have developed a credit application template which we are incorporating as part of this paper. The application template allows the user to collect much of the information that CRF believes to be critical in making an informed credit decision on a new account request. The following business credit application template, which was developed using an Adobe Acrobat program, can be modified with the relatively inexpensive Adobe Acrobat software to meet the specific needs your businesses. The following application is generic in nature and does not account for nuances that may be specific to the industry in which you do business. CRF offers no assurances as to the legality of this document. Prior to use we suggest that you have it modified to suit the needs of your organization and customer base, as well as having it reviewed by your legal department to assure that they are comfortable with its content. This application in PDF format can be sent via to a potential new customer or downloaded from a link on your organization s website. It can be accessed and manipulated with Adobe Acrobat Reader, which is readily available on the internet as free downloadable software. Digital signatures to be incorporated on the application are easily created using the Acrobat Reader software.
5 Instructions for Creating a Digital Signature Using Acrobat Reader (The following instructions explain how to create a digital signature using Acrobat Reader. You may cut and paste these to share with your customers.) Please find attached for your execution a Credit Application Click the attachment to open the form in Acrobat or Adobe Reader. When you are finished, click Submit button In the upper right hand corner to return your data to the form author. You may only set up a digital signature with Acrobat Reader 9 or above. To get the most recent Acrobat Reader (Free), click on: Adobe Acrobat Reader Download Note for Digital Signatures: If you have set up a digital signature in Acrobat or Acrobat Reader simply click in the appropriate digital signature sections and follow the instructions to affix your signature. If you have not yet set up a digital signature you may do so by following these instructions. Sensitive transactions between businesses generally require an ID from a certificate authority rather than a selfsigned one. 1. Do one of the following: In Acrobat, choose Tools > Sign & Certify > More Sign & Certify > Security Settings. In Reader, choose Edit > Protection > Security Settings. Note: If you don t see the Sign & Certify or Protection panel, see the instructions for adding panels at Task panes. 2. Select Digital IDs on the left, and then click the Add ID button. 3. Select the option A New Digital ID I Want To Create Now, and click Next. 4. Specify where to store the digital ID, and click Next. New PKCS#12 Digital ID File Stores the digital ID information in a file, which has the extension.pfx in Windows and.p12 in Mac OS. You can use the files interchangeably between operating systems. If you move a file from one operating system to another, Acrobat still recognizes it. Windows Certificate Store (Windows only) Stores the digital ID to a common location from where other Windows applications can also retrieve it. 5. Type a name, address, and other personal information for your digital ID. When you certify or sign a document, the name appears in the Signatures panel and in the Signature field. 6. (Optional) To use Unicode values for extended characters, select Enable Unicode Support, and then specify Unicode values in the appropriate boxes. 7. Choose an option from the Key Algorithm menu. The 2048-bit RSA option offers more security than 1024-bit RSA, but 1024-bit RSA is more universally compatible. 8. From the Use Digital ID For menu, choose whether you want to use the digital ID for signatures, data encryption, or both. 9. Type a password for the digital ID file. For each keystroke, the password strength meter evaluates your password and indicates the password strength using color patterns. Reconfirm your password. You can export and send your certificate file to contacts who can use it to validate your signature. Important: Make a backup copy of your digital ID file. If your digital ID file is lost or corrupted, or if you forget your password, you cannot use that profile to add signatures.
6 The Credit Application Following you will find an illustration of the CRF Electronic Credit Application. This is a generic application template developed using Adobe Acrobat Pro. Adobe Acrobat Pro is a relatively inexpensive software application that can be used to modify this document. Please be aware that this document is generic in nature and may not meet the legal or practical requirements necessary to conduct business within your industry. Prior to adopting this document for use, CRF strongly recommends that you have it reviewed by legal counsel. To download this electronic application free of charge in an interactive PDF format click on: CRF - Electronic Credit Application Download
7
8 R ESOURCES Visit the Credit Research Foundation website for additional resources Copyright 2011 by the Credit Research Foundation. All rights in this paper are reserved. No part of the publication may be reproduced in any manner whatsoever without written permission. Printed in the United States of America Credit Research Foundation 1812 Baltimore Boulevard Suite H Westminster, MD U.S. $30.00
Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC
Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC Create a self-signed digital ID 1. In the upper left click Edit, choose Preferences, then Signatures on the left, under Categories.
More informationImplementing Electronic Signature Solutions 11/10/2015
Implementing Electronic Signature Solutions 11/10/2015 Agenda Methodology, Framework & Approach: High-Level Overarching Parameters Regarding Electronic Service Delivery Business Analysis & Risk Assessment
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationregister to use the Service, place an order, or provide contact information to an Independent Business Owner;
Privacy Policy Stella & Dot LLC (d/b/a Stella & Dot Family Brands, KEEP Collective, and EVER LLC) and its wholly-owned U.S. subsidiary, Stella & Dot Jewelry LLC (collectively, Stella & Dot, we, us, or
More informationWhat information is collected from you and how it is used
Richmond Road Runners Club PRIVACY POLICY Board Approved: 10/11/2017 Our Commitment to Privacy Richmond Road Runners Club (RRRC) is the sole owner of the information collected on its sites and through
More informationElectronic Signature Policy
Electronic Signature Policy Definitions The following terms are used in this policy. Term Definition Electronic Signature An electronic signature is a paperless method used to authorize or approve documents
More informationDEALER APPLICATION MAIL: DL WHOLESALE, INC LAS POSITAS RD, UNIT A LIVERMORE, CA 94551
DEALER APPLICATION DEAR PROSPECTIVE DEALER, THANK YOU FOR YOUR INTEREST IN DOING BUSINESS WITH US AT DL WHOLESALE INC. INCLUDED IN THIS PACKET IS THE DEALER APPLICATION AND AN ORDER FORM. PLEASE FILL OUT
More informationMinnesota State Colleges and Universities System Procedures Chapter 5 Administration
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration 5.25.1 Use of Electronic Part 1. Purpose. This procedure establishes requirements for the consistent, secure implementation
More informationPrivacy Policy. Effective as of October 5, 2017
Effective as of October 5, 2017 Privacy Policy ClassApps LLC ( ClassApps, we, us, or the Company ) is committed to protecting the privacy of individuals who visit the Company s Web sites ( Visitors ),
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationFirst Data Global Gateway SM Virtual Terminal User Manual
First Data Global Gateway SM Virtual Terminal User Manual Version 1.0 2015 First Data Corporation. All Rights Reserved. All trademarks, service marks, and trade names referenced in this material are the
More informationInternational Standard on Auditing (Ireland) 505 External Confirmations
International Standard on Auditing (Ireland) 505 External Confirmations MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More information2. What is Personal Information and Non-Personally Identifiable Information?
Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location
More informationOnline Filing Guide for Charities and Professional Fundraisers
South Carolina Secretary of State Online Filing Guide for Charities and Professional Fundraisers April 2010 1205 Pendleton Street, Suite 525 Columbia, South Carolina 29201 www.sos.sc.gov Charitable Organizations
More informationFleet Fuel Management Referral Program
1. Account Creation Fleet Fuel Management Referral Program First Time User Instruction Kit Contact Quick Fuel Customer Support at 800-522-6287 for information about fuel programs and delivery options.
More informationWhen you provide personal information to us it will only be used in the ways described in this privacy policy.
Website Privacy Policy Overview Welcome to this Global Payroll Management Institute website, owned and produced by the Global Payroll Management Institute, Inc. (GPMI). Our website is available to all
More informationEnterprise Payment Solutions. Remote Deposit Capture. Remote Deposit Capture User Manual
Enterprise Payment Solutions Remote Deposit Capture 1999-2014 Jack Henry & Associates, Inc. All rights reserved. Information in this document is subject to change without notice. Printed in the United
More informationINTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction Scope of
More informationEXTRUTECH PLASTICS, INC. Custom Extruder of Close Tolerance Profiles
First Time Buyer? Thank you for your order! We need three items from you before your order can go into production: 1.) New Customer Information Sheet (Sheet Number 1): Our new customer information sheet
More informationPRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018
Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationEcological Waste Management Ltd Privacy Policy
Ecological Waste Management Ltd Privacy Policy This Privacy Policy governs the manner in which Ecological Waste Management Ltd collects, uses, maintains and discloses information collected from users (each,
More informationEU-US PRIVACY SHIELD POLICY (Updated April 11, 2018)
EU-US PRIVACY SHIELD POLICY (Updated April 11, 2018) Network TwentyOne International, Inc. located at 7320 McGinnis Ferry Road, Suwanee, Georgia USA 30024 ( N21, we, our, or us ) have the following EU-US
More informationConjure Network LLC Privacy Policy
Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy
More informationPersonal Data collected for the following purposes and using the following services: Personal Data: address, first name and last name
Privacy Policy This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Contacting the User Contact
More informationOverview. IHCP Provider Name and Address Maintenance. indianamedicaid.com
Overview Form indianamedicaid.com Enrolled providers use this form to update the name and address information that is part of their Provider Profile. Four name/address types are maintained for each provider
More information5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented.
Annex to the Financial Services Businesses Handbook Using Technology in the Customer Due Diligence Process A.1. Technology Risk Evaluation 1. A financial services business must, prior to deciding whether
More informationEXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS
SRI LANKA STANDARD 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after 01 January 2014) CONTENTS Paragraph Introduction Scope of this SLAuS... 1 External
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationOnce you have located your account you can begin the return process. Select Start Filing Business Return> 1. Account Info.
Once you have located your account you can begin the return process. Select Start Filing Business Return> 1. Account Info. If you still owned this business on January 1 select YES Verify and update any
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationFor our services, the data controller (the company that s responsible for your privacy), is Rent a Van 365 Limited. Registered address:
Web Privacy Policy Rent a Van 365 Ltd is committed to protecting your personal information. This policy aims to help you to understand what information we may collect about you and how we use it. We are
More informationNew Account Application
*Required fields Date: 3/12/2018 GENERAL ACCOUNT DETAILS *Billing Name and Address City State Postal Code *Shipping Name and Address City State Postal Code Tel# Tel# Email Email Contact Name Contact Name
More informationMichael Phelps Foundation: Privacy Policy
Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects
More informationCAREERBUILDER.COM - PRIVACY POLICY
Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder
More informationRed Flag Policy and Identity Theft Prevention Program
Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationHow to Interact with the Natural and Non-prescription Health Products Directorate Electronically. Guidance Document
How to Interact with the Natural and Non-prescription Health Products Directorate Electronically Guidance Document Table of Contents 1. INTRODUCTION... 3 1.1 System Requirements... 3 2. EPOST CONNECT...
More informationEDI ENROLLMENT AGREEMENT INSTRUCTIONS
EDI ENROLLMENT AGREEMENT INSTRUCTIONS The Railroad EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should be reviewed and signed
More informationSUBJECT: Bureau of Highway Instructional Memorandum Digitally Encrypted Electronic Signatures
Michigan Department of Transportation OFFICE MEMORANDUM DATE: February 28, 2012 TO: FROM: Region Engineers Region Associate Operations Engineers Region Construction Engineers TSC Managers TSC Construction
More information1.2. Survey Information. Company may collect Personal Information from you when you voluntarily complete a Company survey, order form, or a
PRIVACY POLICY This Privacy Policy governs your use of this website and any content, products or services made available from or through this website including any sub domains thereof ("Website"). The
More informationPaymentWorks Form Guide. Non US Individual Setup with Electronic Payment
PaymentWorks Form Guide Non US Individual Setup with Electronic Payment 7 February 2019 Welcome! A request has been made to add you as a vendor within the Johns Hopkins System. The instructions in this
More informationSelf-Assessment Questionnaire A
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance All cardholder data functions outsourced. No Electronic Storage, Processing, or Transmission
More informationTEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085
TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 20 days WHAT PROVIDER NUMBERS DO I USE? Six digit Medicare legacy provider ID NPI Number WHAT
More informationGeneral Terms and Conditions
General Terms and Conditions Contents: Article 1 Applicability Article 2 Definitions Article 3 Identity and Customer Support Article 4 The services provided by Online PrePaid Services Article 5 The offer
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More informationAdobe Sign and 21 CFR Part 11
Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted
More informationInternet Banking Enrollment Form
Internet Banking Enrollment Form Please fill out the enrollment form below, print a copy for your records and also a copy to send to the bank. Please mail to PO Box 8, New Albin, IA 52160. If you have
More informationMASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY
Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal
More informationRETURNS & PAYMENT / PRIVACY/ LEGAL NOTICE
RETURNS & PAYMENT / PRIVACY/ LEGAL NOTICE RETURNS & PAYMENT Satisfaction Guaranteed At Eveready Office Supply, Inc., we want you to be completely satisfied with every purchase you make through us. That
More informationUSER GUIDE: NMLS Course Provider Application Process (Initial)
USER GUIDE: NMLS Course Provider Application Process (Initial) Version 2.0 May 1, 2011 Nationwide Mortgage Licensing System & Registry State Regulatory Registry, LLC 1129 20 th St, N.W., 9 th Floor Washington,
More informationPrivacy Policy. What information do we collect automatically?
We are committed to respecting your right to privacy and protecting your information when you visit RhodesTeamTexas.com or use our services. This Privacy Policy explains our information practices, including
More informationTransUnion Direct User Guide
Topics Welcome to TransUnion Direct... 2 The First Time You Log Into TransUnion Direct... 4 Individual Services... 5 Portfolio Services... 15 Activity Reports... 17 Your User Profile... 19 Help Resources...
More informationSUPPLIER ACCREDITATION APPLICATION FORM
SUPPLIER ACCREDITATION APPLICATION FORM Company Name: Registered Address: Satellite Office: Warehouse Address: Telephone No.(s) : Fax No: Website Address : E-mail Address: Contact Person: DTI/SEC. Reg.No:
More informationREALTORS LEGAL ALERT
C ONNECTICUT ASSOCIATION OF REALTORS, INC. SUITE 1101, 111 FOUNDERS PLAZA EAST HARTFORD, CONNECTICUT 06108 PHONE:800-335-4862 WORLD WIDE WEB WWW.CTREALTOR.COM REALTORS LEGAL ALERT ELECTRONIC SIGNATURES
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationCombined: Centrally Billed Government Purchase, Travel, or Integrated Card Government Liability
Purchase Travel or Integrated Card Note: This form should be completed by the Agency/Organization Program Coordinator with the required information input from the Applicant Please complete the application
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationPart A/Part B/HHH EDI Enrollment (Agreement) Form and Instructions
Part A/Part B/HHH EDI Enrollment (Agreement) Form and Instructions The EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should
More informationIntegration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11
OpenLAB CDS Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 Technical Note Introduction Part 11 in Title 21 of the Code of Federal Regulations includes
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationB. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.
DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily
More informationProcessing an Accounts Receivable via ipayments
Processing an Accounts Receivable via ipayments What is an Accounts Receivable? An Accounts Receivable is an invoice, a bill, a charge, a statement, etc. It is the mechanism used to charge non-tamu (02)
More informationAon Supplier Enablement Coupa Supplier Training Materials
Aon Supplier Enablement Coupa Supplier Training Materials June, 2017 Table of contents Overview: What is Coupa? Benefits for suppliers Invoicing options PO Flip CSP How to connect to CSP? Profile update
More informationJURISDICTION 11 EDI CONTRACT INSTRUCTIONS
JURISDICTION 11 EDI CONTRACT INSTRUCTIONS Submit the completed form to: ABILITY Network, ATTN: Enrollment FAX: 888.837.2232 EMAIL: setup@abilitynetwork.com INSTRUCTIONS Refer to these instructions as you
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More informationVIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY
PRIVACY POLICY Last Modified: September 11, 2017 PERSONS OR PARTIES COVERED This Privacy Policy is intended to cover all visitors to this website, all subscribers to lists or newsletters associated with
More informationDocument Signing Certificate Getting Started Guide
Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing
More informationsign you up for our mailing list so we can send you marketing and survey communications;
Last updated June 4, 2018 Hotel Mela ( Hotel, we, us, or our ) is committed to protecting your privacy when you visit and/or interact with our website located at www.hotelmela.com (the Site ). As such,
More informationOPENING A NEW JACS ACCOUNT... 15
JACS Online Help TABLE OF CONTENTS ACCESSING YOUR JACS ACCOUNTS ONLINE... 4 REGISTERING FOR A USER NAME AND PASSWORD... 4 Registration Instructions... 4 Step 1 - Terms and Conditions... 5 Step 2 Do You
More informationPRIVACY POLICY QUICK GUIDE TO CONTENTS
PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),
More informationInternational Standard on Auditing (UK) 505
Standard Audit and Assurance Financial Reporting Council July 2017 International Standard on Auditing (UK) 505 External Confi rmations The FRC s mission is to promote transparency and integrity in business.
More informationBusiness Manual. Last Updated: April 18, P age
Business Manual Last Updated: April 18, 2017 1 P age Table of Contents Chapter Administration... 3 PO Box/Mailing Address... 3 Generic Email Address... 3 EIN... 3 Bank Accounts... 3 Online banking... 4
More informationSupplier Reference Guide (QRG) Table of Contents
Supplier Onboarding Supplier Reference Guide (QRG) Table of Contents Supplier Checklist... 2 New Supplier Onboarding Steps... 3 Introduction... 4 Registration... 6 Certification... 16 Acceptance... 35
More informationMEDICARE FLORIDA PRE ENROLLMENT INSTRUCTIONS MR025
MEDICARE FLORIDA PRE ENROLLMENT INSTRUCTIONS MR025 HOW LONG DOES PRE ENROLLMENT TAKE? Standard processing time is 3 4 weeks. WHAT FORM(S) SHOULD I COMPLETE? If you do not currently submit electronically
More information3. What is the name of the organisation that runs your business registry?
Sida 1 av 20 International Business Registers Survey 2016 Questions in this survey should be answered for the period January 1 to December 31, 2016, unless otherwise specified. The survey is accompanied
More informationStartup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):
Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationPayment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance No Electronic Storage, Processing, or Transmission of Cardholder Data Version 1.2 October
More informationElders Estates Privacy Notice
15A Bath Street, Ilkeston Derbyshire. DE7 8AH 01159 32 55 23 info@eldersestates.co.uk 31 Market Place, Ripley Derbyshire. DE5 3HA 01773 30 44 44 info@eldersestates.co.uk Elders Estates Privacy Notice Introduction
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More informationWHAT DOES THIS PRIVACY POLICY COVER?
Privacy policy DELIVER MY TUNE ("DELIVER MY TUNE ") knows that you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn more
More information3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?
Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to
More informationPrivacy Policy. Optimizely, Inc. 1. Information We Collect
Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently
More informationTarget Breach Overview
Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems
More informationMEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900
MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 5 business days after receipt. WHAT FORM(S) SHOULD I COMPLETE? EDI Provider
More informationAuditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC
Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements
More informationGDPR Compliant. Privacy Policy. Updated 24/05/2018
GDPR Compliant Privacy Policy Updated 24/05/2018 Overview This privacy policy is in compliance with the General Data Protection Act which aims to empower all EU citizens data privacy and to reshape the
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationPrivacy Policy Personal identification information Non-personal identification information Web browser cookies
Privacy Policy This Privacy Policy governs the manner in which Wavelry Belmont Elementary PTO collects, uses, maintains and discloses information collected from users (each, a "User") of the https:// www.waverlybelmontpto.org/
More informationConsolidated Privacy Notice
Privacy Notice Overview Consolidated Privacy Notice The Southern California Edison Privacy Notice was updated on January 31, 2018 It is important to Southern California Edison (SCE) to protect your information
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationUSC Supplier Portal (PO Suppliers)
USC Supplier Portal PO Suppliers Guide Table of Contents Introduction...2 New User Registration...3 Returning Users...5 Welcome to Supplier Registration...6 Company Overview...7 Business Details...8 Addresses...9
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More information