Customer vulnerability data framework checklist

Every firm is on a unique journey with its customer vulnerability management strategy, which translates into different levels of operational maturity. This checklist should quickly pinpoint areas for enhancement and support the assessment of current capabilities against good practice. Use the following checklist to assess or build a vulnerability data framework.

This checklist was created by the Chartered Insurance Institute; reproduced with permission.

Contact us for a chat if you want to explore these topics and see how to identify, manage, and support vulnerable customers more easily, cheaply, and efficiently using a powerful digital system.

Foundations

  • Data quality: is there a process to maintain the accuracy of core customer contact information over time?

  • Classification: is there a firm-wide, objective taxonomy for classifying customer vulnerability characteristics and severity?

Data model and systems

  • System capability: can the IT systems store, link and analyse key data components (for example, circumstances, severities, potential harms, support pathway and outcomes)?

  • Household view: can systems link individuals to form a family or household unit or view?

  • Combination of circumstances: do our systems show when multiple circumstances of vulnerability are compounding, to make customers’ situations worse?

Governance and policy

  • Data policy: is there a clear policy on storing underlying circumstances, severities, and support needs, as well as when support needs were implemented?

  • UK GDPR compliance: is the lawful basis for processing customer vulnerability data documented? Are security and governance measures robust and compliant with UK GDPR?

Andrew Gething

Andrew is the founder and managing director of MorganAsh. Andrew, a recognised consumer vulnerability specialist and champion, is the driving force behind the award-winning consumer vulnerability management tool, MARS – adopted in the financial services, credit and utilities sectors.

Next
Next

Customer vulnerability management checklist