VP Compliance Services’ Compliance Certified Vender program is an extensive review and audit of a Lead Generator’s policies, procedures, training, background and more. A Compliance Certified Lead Generator is a lead vendor a lender can trust when looking to expand their pool of Lead Generators.
VPCS will display all audits Certified Lead Generator passed from the certification seal provided to certified Lead Generator. Interested parties may reach the Lead Generator’s certification page by clicking the VPCS Certified Vendor logo on the Lead Generator’s website.
A certified Lead Generator vendor will receive our certification logo, a link to a custom web page describing the audit the Lead Generator passed, an introduction to the online lending community as a certified Lead Generator vendor, and a joint press release announcing Lead Generator as certified. This program is unique in that it markets Compliance Certified Lead Generators without being a Lead Generator broker and charging ongoing fees.
In many cases, a VPCS Compliance Certified Vender meets the due diligence and audit requirements of lenders due to passing this audit program.
VPCS’ Vendor Certification program is not recommended to replace a lender’s own Lead Generator vendor review program. It may be used to help select Lead Generators a lender will select for new vendor consideration.
For more information on VPCS’ Vendor Certification program please contact William “Rick” Wittwer at wrw@vpcs.biz.
Lead Generator Certification | |
Certifications & Accreditations | Comments |
Online Lenders (OLA) | Accreditation |
Direct Marketing Association | Certification |
Online Marketing Institute | Certification |
Company Background Check | Comments |
Liens, Actions, Fines, & Investigations | Lexus Nexus Company Background Check |
CFPB, FTC, & State AGs | Regulator Check |
Licensing, Registrations, & Bonds | Comments |
Corporate Registration | Review of state and federal corporate registrations |
DNC Registry and Unsubscribe Maintenance | Review Requirements |
Contract Review | Comments |
Agreements with Lead Buyers (Includes Insertion Orders) | Review Key Elements of the Agreements |
Affiliate Agreement | Review Key Elements of the Agreements |
Policies and Procedures | Comments |
Disclosures | Review of Policy (Does One Exist and is it Complete?) |
CAN-SPAM | Review of Policy (Does One Exist and is it Complete?) |
Fair Lending | Review of Policy (Does One Exist and is it Complete?) |
Identity Authentication | Review of Policy (Does One Exist and is it Complete?) |
GLBA | Review of Policy (Does One Exist and is it Complete?) |
Privacy | Review of Policy (Does One Exist and is it Complete?) |
Record Retention | Review of Policy (Does One Exist and is it Complete?) |
SCRA / MLA | Review of Policy (Does One Exist and is it Complete?) |
UDAAP | Review of Policy (Does One Exist and is it Complete?) |
TILA | Review of Policy (Does One Exist and is it Complete?) |
Vendor Management | Review of Policy (Does One Exist and is it Complete?) |
TCPA | Review of Policy (Does One Exist and is it Complete?) |
Information Security | Review of Policy (Does One Exist and is it Complete?) |
Information Security (GLBA) | Comments |
PCI Scan | Performed on all Client IP addresses |
Written Security Program | Review of Policy (Does One Exist and is it Complete?) |
Information Encryption used when transferring data | Review of Policy (Does One Exist and is it Complete?) |
Network Monitoring | Is 3rd Party Vendor Engaged |
Firewalls installed | Reviewed firewall technology and vendor |
Default passwords and Security Parameters updated | Review of Policy (Does One Exist and is it Complete?) |
Protection against system attacks | Technology exists and is utilized |
Restricted access to Sensitive Information | Review of Policy (Does One Exist and is it Complete?) |
Secure development of system and applications | Review of Policy (Does One Exist and is it Complete?) |
Physical Security | Review of Policy (Does One Exist and is it Complete?) |
Clean Desk Policy | Review of Policy (Does One Exist and is it Complete?) |
Facility Access Monitoring | Review of Policy (Does One Exist and is it Complete?) |
Audits | Comments |
3rd Party | Review of any 3rd Party Audits Performed |
Lead Buyer Performed | Review of any Client Audits Performed |
Training (Employee and Affiliate) | Comments |
TCPA | Review of adequacy and frequency of training |
UDAAP | Review of adequacy and frequency of training |
Call Center | Review of adequacy and frequency of training |
New Client/Affiliate On-Boarding | Comments |
On-Boarding | Review of Prospective Vendor/Client Questionnaire, Contract Review, Background Checks& References |
UnderWriting | Review of Quantitative Decision Criteria Utilized |
Compliance Management Program | Comments |
Oversight | Reviewed organizational structure, authority, and personnel |
Monitoring | Reviewed monitoring programs for adequacy and frequency |
Training | Reviewed training programs |
Complaint Management | Comments |
Written Policies and Procedures | Review of Policy (Does One Exist and is it Complete?) |
Public Internet Search | Performed to Identify any Additional Areas of Concern |
Vendor Name/Keyword | Performed searches and examined all posts |
CFPB Complaint Database | Examined CFPB complaints, resolutions, and response timing |
For more information on how our services can benefit your organization contact us at (877) 350-9933 X2 or sales@vpcs.biz