Always Perform A Reflective UCC Search

Always Perform a Reflective UCC Search: Especially on Your Recent Pennsylvania UCC Filings with Attachments

You should always perform a reflective search on each UCC filing to ensure your filing was indexed correctly. Through a reflective search you are likely to quickly catch errors in the spelling of a party name, and in the case of Pennsylvania, quickly identify when attachments aren’t recorded with the filing.

While performing a reflective UCC search on a Pennsylvania filing, our UCC Specialist identified issues with Pennsylvania’s records: attachments weren’t included with the recorded UCC filings.

Red Alert

You can imagine the potential issue with your UCC filing if your collateral description refers to an attachment, and the attachment isn’t attached.

Upon discovering the error, our UCC Specialist contacted the Pennsylvania Department of State and alerted them of the issue. In response, the Pennsylvania Department of State corrected the issue and then released a statement regarding the missing attachments. You can read the Pennsylvania Department of State’s statement via The National Law Review: Pennsylvania Bureau Notifies Filers of the Loss of Attachments Submitted with UCC Records

Here’s Jerry Bailey with the recap:

If you have questions or need assistance with searches, please contact us!

Most Recent Resources

Blog

Help Your Customer Understand UCC Filings

Filing UCCs? Send your customer this letter to help them better understand the UCC filing and how it impacts them.
Read More
lien index
Lien Index

NCS Credit Lien Index 2023 Q2

The Lien Index decreased 16 points in Q2 2023 to 47. The significant decrease comes as the revised Q1 2023 Index skyrocketed to 63.

Read More
live webinars
Live Webinar

Common Mistakes In UCC Filings

A UCC filing is an incredible credit tool; however, taking and perfecting your security interest requires strict compliance with UCC Article 9. Make sure your UCCs are prepared and filed correctly, or you could jeopardize your security.
Read More