You are on page 1of 42

Vulnerability,

GDPR, and
disclosure
A practical guide for creditors and advisers

TECHNICAL GUIDE 3: RECORDING, USING, ENCOURAGING

Page 1
Contents page

TECHNICAL GUIDE 3
1. What is this guide about?

2. What do we think firms should do?

PART A: RECORDING DISCLOSURES

3. What should we record?

4. How should we record this?

5. What flags should we use?

6. What support codes should we use?

7. What account notes should we use?

8. What about secondary analysis?

9. How long should we keep data?

10. Who can we share data with? V


PART B: USING VULNERABILITY DATA

11. Using data to support individuals

12. Using aggregate data for monitoring

13. Using data to achieve good outcomes

PART C: ENCOURAGING DISCLOSURE

14. What is a disclosure environment? This series of guides was written by


Chris FitchA, Rob BellB, and Colin TrendC.
15. How do we build one?
The development of the series was
PART D: SUMMARY supported by Experian, Financial Wellness
16. What should we do next? Group, NatWest, PayPlan, Shoosmiths,
and Vision Blue.
The series represents best practice guidance,
but does not constitute legal advice.
A
Money Advice Trust
B
RB Compliance
C
Plymouth Focus Advice Centre

November 2020

2
THE GUIDES
The Money Advice Trust and Money
Advice Liaison Group exist to improve “The Money Advice Liaison Group
the lives of people in debt. and Money Advice Trust are delighted to
To do this, they offer leadership and share this series of guides.
guidance on key issues. We hope they bring together the right
We are therefore pleased to support this blend of expertise and vision for the
new series of guides for organisations on practical benefit of all consumers.”
vulnerability, disclosure, and GDPR.
Paul Smee, MALG Chair
Written to bring together two groups -
data protection teams, and staff working
Joanna Elson, Chief Executive,
on vulnerability policy – each guide deals Money Advice Trust
with a different practical issue.

Technical TG1 is about the fundamentals – it explains


what vulnerability means in practice (rather
Guide 1 than just the definition), and why disclosures
of vulnerability are key moments (for
fairness, trust, and transparency).

TG2 walks firms through the choice of which


lawful processing basis to use with
Technical
vulnerability disclosures. This brings together
Guide 2 a legal understanding of GDPR, alongside
insight into the practical needs of vulnerable
customers.

This guide: TG3 focuses on how to record data (flags,


Technical Guide 3 support codes, account notes, and
Recording data secondary indicators), how to use data to
support customers, and how to encourage
Using data
further vulnerability disclosures.
Encouraging disclosure

Our Overview Guide provides a bird’s-eye


overview of selected content and actions
Overview
from all three Technical Guides. This gives a
Guide summary view, with the full detail being
3 found in each Technical Guide.
1. What is this guide about?

In our previous guides In this guide


In Guide 1 we outlined four ‘golden In this guide, we move-on from decisions
principles’ that all firms can follow: about processing base, to three practical
choices that flow from these:
 remember the reality of vulnerability
for the customer (our data come  what data to record on vulnerability
from real people with real problems) (and how to record it using flags,
support codes, and account notes)
 remember the staff who deliver your
policies (make their job simpler not  how to use the data on vulnerability
harder, as this will be more effective) (to best support customers, monitor
trends, and achieve outcomes)
 understand the full detail of each
processing base and choice (and  how to encourage further disclosures
don’t just jump on a ‘solution’) (as customer self-disclosure needs to
complement staff identification).
 record the absolute minimum of the
most relevant data (this requires a
crystal-clear purpose for processing).
In Guide 2 we then explored the choices
firms have to make when processing data
from customer and carer disclosures:
 describing the key lawful bases for
processing data from disclosures
(under both Article 6 and 9)
 emphasising that each base always
has its own strengths and limitations
(there is no ‘magic bullet’ or solution)
 showing how tools such as TEXAS
might be practically improved (to
handle difficult disclosure situations).
FIGURE 1
Our purpose for processing
In both guides, we have been clear: firms
need an approach that works on a ‘data’,
‘vulnerability’, and ‘operational’ level.
We call this the ‘three lens’ approach
(Figure 1).
To achieve it, firms need to bring their
data protection staff, vulnerability policy
staff, and operational experts together.
One ‘side’ cannot decide the approach –
instead, a careful balance of practical
realism, vulnerability sensitivity, and
GDPR compliance needs to be struck.
4
2. What do we think firms should do?

What should we do? What else should we do?


Only a firm can really decide its own This guide is not just about data
direction, as every situation, customer, collection and recording, but is also
and business challenge will be different. about the practical use of these data.
However, in this guide we recommend: We therefore also recommend that:
 when deciding ‘how’ to collect data  when considering how best to
every firm should adopt the mantra: support individual customers:
we aim to collect (and record) a firm brings together the key data
the absolute minimum of the most collected, plus any further evidence,
relevant data for action. to decide on the most practical action.
 when creating systems to record data  when using aggregate data to inform
every firm should use a trinity of: management decisions, firms should:
- multiple vulnerability flags - first, get the basic indicators right
- support need codes (volume, type, support, cause)
- account notes for context - second, get data on key features
 when establishing how long to keep (e.g. use of gambling blockers)
data, every firm should have their - third, collect DPA compliance data
own ‘retention rule of thumb’ that: (e.g. consent refusal/withdrawal)
we do not keep personal data for
- fourth, review the examples of
longer than [needed], and review key
data use described by the FCA to
data every 6-12 months to ensure it is
monitor arrangements for treating
accurate, relevant, and still of use.
customers fairly (page 27).1
 when considering how to share data
 outcome measures are clearly stated
disclosed by vulnerable customers:
as the FCA wants firms to show that:
- conduct a Data Protection Impact
Assessment for external sharing “[vulnerable consumers should]
experience outcomes that are as good
- do not overlook internal sharing of
as those of other consumers”1
data, as this is equally critical.
Finally, this guide recommends that firms
do not passively respond to vulnerability
disclosure, but actively encourage this:
 by creating disclosure environments
that make it simple for customers to
tell firms about a support need, and
send reassuring messages, signals
and explanations to customers about
what will happen to their information
if they did disclose to a firm.
1. FCA (2020). Guidance Consultation and feedback statement. Guidance for
firms on the fair treatment of vulnerable customers. GC20/3.

5
PART A: RECORDING DISCLOSURES

3. What should we record?


4. How should we record this?
5. What flags should we use?
6. What support codes should we use?
7. What account notes should we use?
8. What about secondary analysis?
9. How long should we keep data?
10. Who can we share the data with?

6
3. What should we record?

What should we record? That sounds like a lot of data…


Understandably, the FCA does not offer The GDPR does not address vulnerability.
a definitive ‘shopping list’ of the things But it does say personal data should be:
firms should record about vulnerability.
“adequate, relevant and limited to what
Instead, firms should reflect on the data is necessary in relation to the purposes
they need in order to provide a customer for which they are processed”.2
with a reasonable level of support.
Firms need to reflect on each part of this.
This might include:
i. Adequate information
 what a customer is vulnerable to: Adequacy is all about having the right
- things that make it harder to fairly amount and quality of data to support
choose, purchase, access, use, talk customers in vulnerable situations.
with, complain about, pay for, or It means asking what must be recorded
benefit from a product or service when a disclosure happens to capture:
- things not related to a product or  any immediate customer support
service in the ways described needs that are acted on (e.g. removal
above, but where a firm can either from dialer, communication changes,
(a) still take internal action to help, or adjustments to service provision)
or (b) signpost, refer, or partner
with an external specialist agency  any support needs that may develop
over time, and need to be followed-
- where a customer is potentially up on (e.g. a Stage 1 cancer diagnosis
vulnerable (at higher future risk), without any current need for support
and actually vulnerable (where might, in time, progress to a Stage 2
harm is being experienced now). diagnosis where support is needed)
 any customer views on what support  any contextual information to meet
could help this situation including: these support needs sensitively (e.g.
a customer calls: five broad ‘support
- adjustments to process
need’ flags are on her account – such
- changes to contact methods as ‘talk slowly’– but no record/note
- actions involving external third- exists on the severity of these needs,
parties whether they are episodic or long-
term, or any actions we might take
- actions involving internal that could cause or trigger further
departments. harm).

 any contextual information – such as Taking such steps will help firms ensure
the cause of the vulnerability – that customers do not have to repeatedly
could help provide this support re-disclose a vulnerable situation.
This can prevent situations where a
 any other information to help take
customer contacts a firm, assumes the
action to prevent, minimise, or avoid
firm knows about a previously disclosed
the harm a customer is vulnerable to.
vulnerability, but discovers they have to
re-disclose all of this again.
2. ICO. https://tinyurl.com/yynjobl5

7
FIGURE 2

Adequate
Customers often disclose  This is about having the right amount
vulnerable situations in detail, and quality of data to help customers.
and in ways which can  It is about ensuring a good picture is
challenge our ability to respond. painted of the customer’s situation.
 It is about important details not being
left out, or questions left hanging.
 It is about having enough information
to decide what actions to take next.

Relevant
 This is about having the information
needed to inform practical action.
 It is about answering the key question
Adequate ‘vulnerable to what?’
 It is about establishing what difficulties
or harm a customer is experiencing,
Relevant and what our firm can do about this.
 It is about recording information that is
Limited essential, rather than ‘might be useful’.

Limited
 This is about having the absolute
minimum of the most relevant data.
 It is about balance - having the data
firms need to help a customer, but not
Firms respond by ensuring collecting data that is never used.
they record the absolute  Data protection teams should ask
minimum of the most relevant vulnerability specialists what data and
data needed to provide insights they need to do their job.
meaningful care and support.  Firms that only collect ‘support need’
data are likely to miss key insights, and
may cause further customer harm.
8
ii. Relevant information How do we act on our principles?
Relevancy is about collecting information It is one thing to have a set of principles,
that will directly inform a firm’s actions – but another to consistently act on them.
rather than just being ‘of interest’.
We would make four observations.
In relation to disclosures of vulnerability,
First, ensure one of our primary
this is about recording information that:
purposes for processing is understood by
 will help improve the ways in which a all staff: to help our vulnerable
firm interacts with a customer customers.
 will improve a customer’s ability to While compliance with the GDPR is key,
access (and use) a product, service, firms have a choice in how they do this.
or process
They must therefore adopt an approach
 is about any difficulties, detriment, or that delivers compliance, and provides
harm a customer is experiencing that the data staff need to help customers.
affect their relationship with the firm
Second, provide staff with the tools to
 answers the question “vulnerable to extract and record the most relevant
what?”, and records what customers information.
feel will prevent detriment from this.
There are several candidate tools to
Critically, all of this insight is recorded to assist with this. These are briefly
help prevent customer harm. described in Guides 1 and 2.
Third, ensure staff are trained in turning
iii. Limiting data collection conversations into data.
Limiting and minimising the amount of
This can be challenging for staff, but it is
data held about a vulnerable customer’s
important they are able to accurately
situation is an important safeguard.
summarise a customer’s vulnerable
However, it can go too far – causing situation, support needs, and what the
harm for customers and firms. customer is practically vulnerable to.
Most often, this happens where firms Fourth, careful planning and investment
introduce ‘blanket’ data policies only should be made into vulnerability flag
allowing support needs to be recorded. and data systems – these can provide a
While done to minimise the amount of useful resource for both limiting and
special category data collected, this can organising the information firms hold
– as illustrated in Guides 1 and 2 – make about vulnerable customers.
it more difficult to help customers.
Further, even where support needs are
recorded, these may still inadvertently
infer an underlying health issue, making
them special category data after all.
For these reasons, we must remember
one of our main purposes for
processing: to help our customers,
rather than collecting data that half-
explains how we do this.
9
4. How should we record this?

Every firm is different Building blocks


Every firm is different when it comes to When recording data on vulnerability,
their information and data systems. firms should consider their use of:
Many firms will have ‘legacy systems’
 flags for staff - once set, these signal
where a patch-work of different
to staff that a customer has been
databases exists across a firm (often not
identified as vulnerable to harm.3
linked, nor using the same protocols).
Firms will typically use multiple flags.
Other firms may be mid-way through an One flag will signal the presence of a
IT renewal project, where only small ‘vulnerability’, whilst others will alert
changes can be made to an already staff to key customer characteristics.
agreed blue-print for data recording.
Problems can occur with flags where
Meanwhile, some firms will be in the they are not visible across all systems,
early stages of creating their systems, or staff do not understand the flags.
and just working out what vulnerability
flags, notes, or indicators are needed.  support categories – some firms have
systems that allow staff to categorise
One common factor the support given to customers.
However, whatever stage a firm is at, These involve staff choosing support
one thing is clear: an effective system codes off a drop-down list, which are
for recording vulnerability data is rarely then visible on the customer account.
introduced overnight or ‘first time’.
Such a system can, however, only be
Instead, firms will need to work within used if a firm has mapped what help
existing constraints (IT, budgets, time), it will give to different vulnerabilities.
and be prepared to work – in steps –
towards a new information system.  account notes – these allow staff to
write a brief contextual note about a
Listen, test, learn, repeat customer’s situation and needs.
In developing a new system for recording In doing this, staff should always aim
vulnerability data, it is vital that firms: to record the absolute minimum of
 listen to frontline staff on: the most relevant data. Problems,
however, can occur where staff are
- what vulnerability data they need
unsure what ‘relevant’ data is –
‘at their fingertips’ to help customers
recording too much, or too little.
- what problems they have with the
way vulnerability data is recorded  secondary analysis – the above data
and shared on/across systems. are not only used in helping individual
customers, but in also giving a view
 test and learn: across the entire customer base of
- pilot/test any improvements to data the level and type of vulnerability,
recording (before any wider roll-out) trends over time, and key outcomes.
 repeat this process (where possible) This allows a firm to better ‘know’ its
so that staff have the opportunity to vulnerable customers, and grasp how
comment on the pilot process. they are being supported and helped.
10 3. Firms should be aware that any flags that are set will be seen if a customer
makes a Subject Access Request (unless an exemption applies). Therefore
they need to be able to justify why certain flags were applied against a
customer’s record in the event of any challenge from a customer.
FIGURE 3

The purpose of a flag is to send a clear and immediately visible signal to staff.
They are not meant to provide a detailed description. Instead they simply alert a
FLAGS staff member to an issue they need to take into account.

Examples: Vulnerable customer – YES Disclosed a disability - NO


Refer to specialist team – NO Sensitive care needed - YES

The purpose of a support category is to describe the help a customer needs.


They are like a flag, but are usually formed of short pre-written sentences.
SUPPORT
When staff provide support to a vulnerable customer, they can choose one or
CATEGORIES
more categories to describe this help. This is then visible to other staff who deal
with this customer, and also provides useful monitoring information.

Examples: Alternative format – YES Third party access - YES


Decision-making limitation – NO Opt out of lending - YES

The purpose of an account note is to give the detail/context that flags cannot.
ACCOUNT
Staff need to record the absolute minimum of the most relevant information
NOTES about vulnerability. However, they are often unsure what this means in practice.

Example: “The customer has been diagnosed with Ataxia – they have said
this can affect their speech. They say it can mean they sound
drunk. However, they can speak if given the time to do this.”

SECONDARY The purpose of secondary analysis is to get an aggregate picture of vulnerability.


ANALYSIS It gives firms a ‘bird’s-eye’ view across the entire customer-base of the number
of vulnerable customers, the types of vulnerability reported, and the actions
being taken to support these customers.
Firms will pool together data from flags and support codes to build this picture.
However, they may also get staff to collect other data to aide this monitoring.

Examples: Cause of vulnerability – LIFE EVENT Length – FLUCTUATING


Customer referred to debt advice – YES Query resolved - YES

11
5. What flags should we use?

What should our flag system do? What flags should we use?
The purpose of a flag system is to: There are a potentially large number of
 visually alert a staff member flags available to firms (Figure 4).

 inform them that a customer has In making this decision, firms should
been identified as vulnerable to harm consider the following factors:

 remind the staff member to actively  flags signal a problem, they do not
take any vulnerabilities into account describe it in detail – firms should
not have too many flags for staff to
 direct them to consult support codes interpret, remember, or look out for.
and account notes for vital context Keeping it simple is key.
 allow staff to add, update, or remove  however, a single vulnerability flag is
flags to reflect a customer’s situation too simple – customers often have
 contribute to a data-set that monitors multiple problems, a range of needs,
vulnerability across all customers. and with different levels of severity.
Some of this – like customers at high-
Dashboard risk of harm, or with communication
To do this, firms need to have a series of problems - need immediate flagging.
flags that act like the dashboard of a car. One vulnerability flag cannot do this.
These should be limited in their number,  others may be involved – customers
clearly visible at all times, and succinctly may be supported by a firm’s internal
inform staff about vital information. specialist team, or an external third-
Looking back party (e.g. family or debt adviser).
However, we would never drive a car by Being alerted to this from the outset
only looking at our speedometer, rather can be beneficial to staff.
than in our mirrors, or the road ahead.  ‘unfinished business’ – sometimes,
Therefore we need a flag system that due to emotional upset or practical
reminds staff to look back at support difficulties, staff will not be able to
codes and account notes (as these will complete all the actions needed with
provide key contextual information). a vulnerable customer. Flagging this
can allow conversations to be broken
Road ahead into smaller, more manageable parts.
And we need a forward-looking system.
 time and date stamps are key – flags
This should inform conversations with need to be accurate, up-to-date, and
customers about their current situation, reviewed for accuracy. Therefore
and allow staff control over flag setting knowing when a flag was set/is due
to reflect any ‘new bumps’ in the road. for review is important.
It should allow potential vulnerability to  ‘feedback loops’ help – frontline staff
also be flagged (so that firms can ‘watch’ are in the best position to feedback
for any emerging problems over time). on how well a flag system is working,
and what flags need to be changed,
added, or removed.
12
FIGURE 4 MOST BASIC ADDITIONAL FLAGS MOST
FLAG (STAFF ‘TICK ALL’ DETAILED
THAT APPLY) INFORMATION

EXAMPLES

LIFE EVENT
Is there a HEALTH CONDITION DETAIL ON SEPARATE
vulnerability YES FINANCIAL DIFFICULTY VULNERABILITIES IN
issue? FINANCIAL SKILLS ACCOUNT NOTES AND
LONG-TERM | SHORT-TERM SUPPORT CODES
FLUCTUATING
POTENTIAL VULNERABILITY

Is there an SPOKEN COMMUNICATION DETAIL ON THE SUPPORT


accessibility WRITTEN COMMUNICATION NEEDED TO ENABLE
YES MORE TIME NEEDED ACCESS IN SUPPORT
issue?
DECISION-MAKING CODES
CANNOT USE IVR
ENGLISH LANGUAGE ISSUE

ACCOUNT NOTES AND


Is there a GREATER SENSITIVITY SUPPORT CODES PROVIDE
risk or greater YES REFER NOW TO MORE DETAIL (THESE MAY
care issue? SPECIALIST SUPPORT TEAM BE LOCKED TO SOME
STAFF IF SITUATION IS
CHECK ACCOUNT NOTES VERY SENSITIVE)

Is there a AUDIO CORRESPONDENCE FIRMS CAN USE A


customer support BRITISH SIGN LANGUAGE RANGE OF SUPPORT
need? YES ALTERNATIVE FORMAT CODES TO BETTER
NUMERACY SUPPORT CATEGORISE AND
CHIP & SIGNATURE QUANTIFY NEED

Is a INTERNAL SPECIALIST TEAM ACCOUNT NOTES


third-party MANDATED 3RD PARTY PROVIDE THE DETAIL OF
YES POWER OF ATTORNEY THESE ARRANGEMENTS
involved?
CARER DISCLOSURE
FRAUD RISK

Are there any CONTINUE INTERRUPTED ACCOUNT NOTES


unresolved DISCLOSURE DESCRIBE THE DETAIL OF
YES WHAT ACTIONS NEED TO
actions? CHECK-IN ON CUSTOMER
BE TAKEN AND WHY
REQUEST MEDICAL
13 EVIDENCE
6. What support codes should we use?

What should our codes do? What codes should we use?


The purpose of support codes is to: There are a large number of potential
 clearly and quickly communicate to support codes firms could use (Figure 5).
staff what help a customer may need In deciding this, the issues that apply to
 present this information using codes flags need consideration (see page 12),
or short pre-written sentences plus the following:

 allow staff to add, update, or remove  support codes need to be visible and
codes to reflect a customer’s situation understandable – there is no point in
firms devising support codes, if they
 direct staff to consult account notes if are not immediately visible to staff.
greater detail is needed (particularly Equally, visible codes are little use if
where need is complex or long-term) they are too complex to understand
 use these fixed codes and categories without a reference book.
to quantify the help and support  support codes can indirectly infer
given across the customer base specialist category data – where a
 take an approach that requires firms code describes a form of support for
to think systematically about the a particular health condition – such
categories of support they can offer. as a hearing impairment - then this
represents special category data (and
Why codes and categories? must be processed accordingly).
Firms will often record customer support In short, if a support code infers an
needs within the account notes section. underlying health condition (or other
This is understandable – particularly if a special category data), it has to be
customer’s support needs are complex, treated as special category data.
detailed, and require explanation.  account notes are still needed –
However, one disadvantage of account support codes exist to alert staff to
notes is that this information can easily customer need. However, account
be overlooked when multiple pages of notes should be used alongside to
notes and past entries exist. provide more detail (e.g. if needs are
multiple, complex, or long-term).
Using codes that visually alert staff to the
support that vulnerable customers need,  time, dates, and feedback loops
can help to overcome this basic problem. stamps are key – like flags, codes
need to be accurate and up-to-date.
Equally, it also forces firms to develop
Therefore knowing when a code was
their support strategy – as in order to
set/is due for review is important.
create such codes, firms need to know
Staff should also be able to feedback
what help they will (and won’t) provide.
on how well the support code system
Doing this requires resources – however, is working, and what codes need to
its pay-off lies in the alerts staff are given be changed, added, or removed.
on the help individual customers need,
 customers will usually know best
and the aggregate data produced on
about the support they need – if in
support needs across the customer base.
doubt, staff should always ask.
14
Potential support codes: an A to W FIGURE 5
Audio CD correspondence Easy Read correspondence
Requires audio correspondence/interaction. Customer has correspondence needs.
Authentication/ID issue English language support
Customer struggles with authentication. This customer may need English language
Bereavement/grief support (due to written/verbal problems).
Has had a recent death of someone close. Failed ID & Verification
Blocker Different verification route is needed.
Customer has turned on spending block. Fraud risk
Braille correspondence Under investigation/care of fraud team.
Communication in an alternative format. Hearing/induction Loop
British Sign Language interpreter Customer requires hearing loop.
BSL required. Large print correspondence
Cannot sign/signature may vary Large print required.
Customer signature may vary when they Life event support
sign a document (illness/writing difficulties). Disruptive life event (death, birth etc.).
Check before disclosure (joint product) Literacy issues
Customer does not want their details This customer might struggle with literacy.
disclosed to another party on that account. May prefer non-written support/talk.
Chip & Signature/No Chip & Pin Longer appointment time needed
Does not use Chip & Pin. More time required due to vulnerability.
Communication needs No contact via telephone
Ask customer what these are/follow advice. Cannot use/does not want phone contact.
Court Protection/Public Guardian Numeracy issues
This is registered on customer account. Customer might struggle with numeracy.
Customer contact (repeat/frequent calls) PoA/Representative Access
Customer contacts us repeatedly. Power of attorney is present.
Digital issues Text Relay
Customer might struggle with digital skills. Uses text relay service to communicate.
Decision-making limitation support Third party
This customer may struggle to make certain Customer account has third-party mandate.
decisions without our support and help.
Unable to use Interactive Voice Response
Developing situation (watch) Cannot use IVR if contacting by phone.
A potential vulnerability has been disclosed
that could emerge and develop over time. Written confirmation required
Requires written confirmation (e.g. due to
Difficulty with speech mental capacity, memory issues, etc.).
Customer has difficulties in talking/speaking
(but not in understanding what we say).
15
What about ‘disclosure outcomes’? Which outcomes could we record?
When a customer discloses a vulnerable Again, firms will need to consider their
situation, firms will want to help. own specific processes and needs, but
And support codes will help to categorise the following disclosure outcomes are
the vast majority of these responses. often recorded:

However, firms may take other actions  external referral to debt advice agency
which although still helping a customer, – this signposting support code allows
may be more about following process. staff and firms to understand who has
been referred to a debt advice partner
These might include, for example, staff
signposting to an external service that  external referral to health organisation
offers specialist gambling support. – similar to the above, this signposting
support code tracks referrals to either
It could involve recording that contact
specific named health organisations,
was made with the emergency services
or more general signposting
due to concern about the customer.
Or it could simply be that a transactional  escalated as a complaint – this allows
problem was successfully resolved. insight into which vulnerable customers
have been escalated to complaints due
Future contact and monitoring to a report of poor service or practice
Recording such actions using a support
code can help during future contact with  emergency service contact – this gives
that customer (allowing staff to see what insight into customers who have caused
signposting or processes were followed). serious enough concern for a firm to
have contacted an emergency service
It can also help – as seen in the section
on aggregate monitoring – to describe  escalate to another team – firms may
this across the whole customer base. want to track referrals between teams,
so that they can establish how quickly a
This may be particular useful – as noted customer issue is resolved
by the FCA - when comparing the
treatment and outcomes of vulnerable  query resolved – this allows firms to
and non-vulnerable/other customers. track how many queries from
vulnerable customers are resolved
Clearly, account notes can provide such
information. However, the visual alert  ongoing/ unclear/unresolved – this
given to staff, or the aggregate picture allows firms to track how many queries
built-up by using these codes across the are ongoing/ unclear/unresolved
customer base, can be invaluable.  other – an ‘other’ category is important,
as it allows staff to report actions not
covered by current codes, but where (if
there is a good reason) such codes could
be created in the future.

16
7. What account notes should we use?

What should our account notes do? What notes should we use?
The purpose of account notes is to: As account notes reflect an individual
 give the additional detail and context customer’s specific circumstances, it is
that cannot be conveyed in a flag, not possible to offer generic examples.
support code, or outcome measure However, in developing staff ability to
 allow staff to read previous notes, write flag notes, firms need to consider:
and add new account notes to reflect  minimum / maximum ‘rule’ – staff
a customer’s current situation should aim to record the absolute
 provide a data-source that – in the minimum of the most relevant data
absence of support codes or outcome possible in an account note. In
measures - can be ‘word scrubbed’. practice, this will mean thinking
about what information will be
Pinned not lost (where possible) needed to both inform meaningful
One of the key problems staff can have action, and also help the next
with account notes is that they can be member of staff (who won’t have
‘lost’ or overlooked when multiple pages had contact with the customer) to
of notes and past entries exist. provide the support needed.
Consequently, some firms allow staff to  vulnerable to what? – account notes
‘pin’ the most current and relevant notes provide an opportunity for staff to
to the top of the first page of notes. record exactly ‘what’ a customer is
Where such an option isn’t available in a vulnerable to, and what actions
firm’s system, alternatives should be might be taken to avoid this.
sought (such as repeat posting of older  facts not feelings – notes should
notes – to ensure they appear first). normally only contain facts (what was
said or done by a customer) rather
‘Word scrubbed’ (where needed) than impressions or feelings that a
Sometimes firms will be unable to use staff member has. If impressions
vulnerability flags, support codes, or have to be recorded, these should be
outcome measures. clearly marked as such. At all times,
In such situations, firms may choose to staff should never guess or ‘diagnose’
batch process or ‘word search’ their what is causing a customer to act in a
account notes for specific key-words certain way.
related to vulnerability.  account notes can infer special
These can provide an approximate category data – as noted earlier,
indicator of how many accounts may where an account note mentions a
involve some form of vulnerability. form of support for a particular
health condition – such as a hearing
Such a measure can be used in lieu of impairment – then this represents
flags or support codes, or may be used to special category data (and must be
establish a ‘missed case’ where such a processed accordingly).
flag or code should have been applied.

17
8. What about secondary analysis?

What should our analysis do? What indicators could we use?


The aim of secondary analysis is to: Again, there are numerous secondary
indicators that firms could use (Figure 6).
 give an aggregate overview of the
vulnerable customer base, and its In deciding upon this, firms should take
characteristics and trends over time. into account the issues noted for flags
and support codes (pages 12 and 14).
 allow firms to better ‘know’ their
vulnerable customers, and compare They should also consider whether a real
their experience and outcomes with need exists to record a secondary
other/non-vulnerable customers. indicator about vulnerability.

 allow firms to use these data to Routinely recording such data may
inform the design and operation of require extra staff time, and firms need
journeys, processes, products, and to build this into operational planning.
services that better meet the needs
Anonymised data
of customers in vulnerable situations.
Where a valid legal basis for processing
How might secondary analysis work? exists, firms will be able to record data
When a vulnerable customer contacts a directly on a customer’s account.
firm, or discloses their situation: Taken together with information from
other accounts, these aggregate data can
 a firm’s first instinct must be to use
then be used to monitor and evaluate
any flags, support codes, or notes to
the fair treatment of customers.
best help that individual customer
(as discussed earlier in this section) However, if an appropriate legal base for
processing personal or special category
 as a second task, a firm might then data does not exist (such as where
‘pool together’ data from such flags consent has been refused), then firms
and codes to describe vulnerability may wish to consider recording the
across their entire customer base information as anonymised data.
 and as part of this, a firm might then This requires a firm to strip away any
require staff to routinely record identifiable information, and create a
other data about each vulnerable new record which is no longer linked to
customer to add further detail to that the original customer account, and
picture of the wider customer base. where the re-identification of individuals
The secondary analysis element will cannot take place.
then come into how a firm uses this pool In doing this, firms can ensure that data
of data to inform and guide its strategy that might be useful for aggregate
on working with vulnerable customers. monitoring purposes are not lost
(while being mindful that this can
introduce issues of ‘double counting’
into aggregate data, if a customer agrees
at a later point for their linked account
data to be used for these purposes).

18
Other indicators: A to V FIGURE 6
Addiction Length (permanent, temporary)
Age (75+) Length (short, medium, long)
Age-related issue Life event (change circumstances)
Authentication/ID issue Literacy issues
Branch assistance required Lost job
Breakdown Medical issues
Cancer Mental health problem
Care leaver Non-standard requirements
Caring responsibilities Numeracy issues
Confirmed deceased Other
Consent could not be obtained Payment issue
Consent not given/refused Physical health issue
Consent withdrawn Referred from fraud
Counter transaction required Refugee
Critical illness Rejected medical write-off
Customer contact (repeat/frequent calls) Relationship breakdown
Customer is a carer Repossession
Decision-making limitation support Risk (high)
Disability Suspected deceased
Domestic abuse Suspected or confirmed as missing
Elderly Suspected vulnerability
Financial or economic abuse Terminal illness
Financial capability Third parties (involved)
Financial difficulty Third party help to manage their account
Financial resilience Third party support (POA/EPOA/OCP)
Financial understanding Unconfirmed/unverified/
Gambling addiction Unverified observation from 3rd party
Housing problem Vital interests
Language barriers
Learning disability

19
9. How long should we keep data?

How long is long enough? iii. Recognise there are exceptions


The ICO has a simple message when it As noted earlier, customers will inform
comes to data storage: firms about vulnerabilities where they
expect an imminent change might occur.
“[firms] must not keep personal data
for longer than [they] need it”.4 This may involve a potential vulnerability
(such as an early stage medical diagnosis
However, neither the ICO nor the GDPR that may become more serious in time).
state how long this period should be.
In such situations, firms might monitor
So what should firms consider when these customer accounts more regularly,
developing their retention policy on data to check both the stored data is correct,
from vulnerability disclosures? and no additional support needs exist.
i. Start the clock iv. Recognise complexity
The first step firms can take is to ensure As always, firms will want to recognise
that time/date stamps are placed on key that customers may disclose more than
data items. one type of vulnerability to harm.
This may sound obvious – however, it is In these situations, it may be necessary
not uncommon for firms to date stamp to set multiple ‘time to review’ flags.
their account notes, but not apply similar This can be important if a firm uses an
stamps to flags or support codes. automated process or tool-set (such as
Without such information, it can be very robotic processing) to batch-process
difficult for firms to establish exactly how customer account data.
long vulnerability data have been held. v. Allow customers more control
ii. Devise a ‘retention rule of thumb’ The simplest way to keep vulnerability
Firms will already know that vulnerable data updated, is to give customers the
situations can change over time. option to do this themselves.
Some customers will directly keep a firm Some firms, for example, are planning
updated on their situation, and staff will ‘spaces’ in their account dash-boards
make changes to the relevant data. where customers will be able to request
a support need, let a firm know they
However, some customers will not offer
are disabled, or share other relevant
such updates, and a firm must therefore
vulnerability information.
set a time-limit after which these ‘quiet’
accounts are reviewed, and a decision Importantly, this will give customers the
made on whether the vulnerability data option – in limited ways – to update,
is updated, or deleted from a system. change, or delete this information.
Again while some individual cases will vi. Purpose for processing
need different treatment (see opposite), Finally, firms should always consider
some firms review such cases every 6-12 their purpose for processing the data,
months, contacting customers where it is alongside any wider legal or regulatory
necessary to update their information requirements on data storage.
(and deleting data where it is not). 4. ICO (2020) https://tinyurl.com/yxe23x3z

20
10. Who can we share data with?

What data should we share? What do firms need to remember?


Sometimes firms will want to share data From the outset, firms need to know:
about customers in a vulnerable situation
 the GDPR does not stop data sharing,
with a third-party organisation.
or create additional barriers
In this section, we review what a firm
 there are often clear benefits in data
(acting as a data controller) should think
sharing (when correctly planned)
about prior to sharing vulnerability data
(with another data controller).  consent is only one basis on which
data can be shared (although it may
Throughout, we encourage firms to think
be the simplest and clearest)
about their purpose for processing, and
to challenge themselves to consider how  data can always be shared in a true
sharing vulnerability data fits into this. customer emergency situation
Consequently, our starting point is not  but whatever approach is taken,
‘what’ data to share, or ‘how’ to share it, firms always need to assess whether
but whether data need sharing at all data really need to be shared.
(the ‘necessity test’ covered in Guide 1). To assess whether disclosed vulnerability
data need to be shared (and if so, how to
Key reading: ICO Code of Practice do this), every firm should:
It is important to note the ICO is due to
publish an updated statutory Code of  conduct a thorough Data Protection
Practice on data-sharing. Impact Assessment (DPIA) where it is
necessary to do so6-7
Already consulted on, the current draft
Code of Practice is on the ICO website.5  have a data sharing agreement in
place with the external organisation
As every firm should read this document, (if data-sharing is a regular event)
our guide does not duplicate its content,
but instead considers its most key points.  ensure these comply with the key
GDPR and DPA principles and rights
(including fairness and transparency)
 have a lawful basis for processing
personal and special category data
 be aware of any additional steps
needed to process law enforcement
data, or data regarding children.
In this section, we will not re-describe
the principles and rights of the GDPR and
DPA (these are dealt with in Guide 1).
Similarly, the lawful bases for processing
5. ICO. https://tinyurl.com/yxdr4d69
6. The ICO provides detailed guidance on undertaking a DIPA.
will not be covered (see Guide 2).
This can be found at: https://tinyurl.com/y45tgy59
Instead, we will focus on what a DPIA
7. Firms do not need to conduct a DPIA for every piece of
information they wish to share, as this would be time and resource should cover, and what thinking firms
intensive. Instead a DPIA only needs to be conducted where a firm
identifies that data sharing is necessary, where sharing should be fair
need to do for vulnerable customers.
and lawful (lawful basis and providing privacy information), where 21
only the minimum amount of information necessary for the purpose
is shared, and they document their decisions for sharing the
information.
Should we share data? Group three: legal basis
Before deciding to sharing data, firms  are we allowed to share the data?
should ask themselves the following Firms will need to check if there is a
practical questions about data sharing. statutory bar or other restrictions on
These questions fall into five groups. data sharing.
Group one: aims and definitions  do we have a basis on which to
share the data? Firms will need to
 what is the aim of sharing the data?
establish what processing basis they
Firms need to be absolutely clear
will use to share both personal and
what the specific purpose of data-
special category data that has been
sharing is, and be able to justify this.
disclosed to them.
 what information needs sharing?
Group four: practical mechanisms
Firms must be able to explain exactly
what data they need to share, rather  who requires access to the data?
than offer broad/vague descriptions. A firm’s policy should make it clear in
Firms should only share the absolute who – in the external organisation –
minimum of the most relevant data. will have access to customer data. As
always, data should be shared on a
Group two: risks
‘need to know’ basis. This means
 what risks does sharing pose? only relevant staff in a firm and the
Firms need to outline the risks that external organisation should have
sharing customer data might pose. access to the data.
This could include customer exposure
 when should we share the data?
to harm (physical, emotional, social
Firms will need to describe in what
or economic), customers being likely
circumstances disclosed vulnerability
to object to processing, or customer
data will (and will not) be shared.
trust in a firm being undermined.
It is important for firms to make it
Measures must be put in place to
clear whether data sharing will be a
mitigate these risks.
routine activity, or a ‘one off’.
 is it possible not to share data?
 how should we share the data?
Firms must be able to show that they
The mechanism and process for
couldn’t achieve their purpose for
sharing should be described in a
processing without sharing the data.
firm’s data and vulnerability policies.
If this is not possible without sharing,
This should include appropriate
they must explain why anonymised
security provisions.
data could not be shared instead.
Group five: evaluation and refreshing
 is it ‘right’ to share data? Firms will
need to consider both the benefits  how can we routinely check our
and risks of sharing customer data objectives have been achieved?
(both for the customer, the firm, and Firms will need to demonstrate
wider society). Data sharing should whether the actions taken have
be proportionate to the objective for achieved the purpose for processing.
processing. They will also need to explain how
they will repeat the DPIA to ensure it
is current and up-to-date.
22
Considering vulnerability  emergency situations – firms should
To ensure a firm considers vulnerability identify scenarios where vulnerable
when thinking about data sharing, firms customer data might need to be
should pay particular attention to: shared in an emergency situation.
 the lawful bases for processing – This is not only about identifying
in Guide 2, we explained how firms which situations might arise, but also
could use a ‘vulnerability lens’ to being clear on what data would best
both choose a suitable processing be shared when these occur.
base, and also ensure that it was
used in a way that recognised any Summary
additional needs that vulnerable In this section, we have considered the
customers often have. factors a firm should take into account
prior to sharing vulnerability data with an
 the GDPR and DPA principles and external organisation.
rights – it is critical that firms always
remember that ‘data processing’ is a In doing this, firms should be aware of
term that covers all aspects of data the risks of data sharing – and always try
collection, use, storage, and sharing to prevent or minimise these.
(see Guide 1). Consequently, firms However, firms should not let any of this
need to think carefully about how the totally overshadow the benefits either,
principles and rights of the GDPR and as not sharing data in itself can also be
DPA are complied with in relation to harmful.
sharing vulnerability data.
As with the ICO says itself, firms should
 remembering that they are sharing weigh-up both these risks and benefits,
real data, from real people, living and take into account firm and customer
with real problems – therefore these interest.
individuals will be concerned with
And this can only be done through
these difficulties and problems,
careful planning and discussion which
rather than reading or searching out
involves the perspectives of the Data
a firm’s data protection policies.
Protection Team and Vulnerability
Firms therefore must put themselves
Specialists being considered.
in the shoes of their most vulnerable
customers and ask: would I expect
my data to be shared in this way?
Am I getting a clear explanation of
how my data will be shared? And
would I say I am being treated fairly?
 establishing how individual rights
will be upheld (where relevant)?
Customers have the same rights
(including those to access, being
informed, erasure, and objection) as
with any other part of processing.
Firms need to ensure these are
addressed, and also upheld in any
data sharing arrangement.
23
PART B: USING VULNERABILITY DATA

11. Using data to support individuals


12. Using aggregate data for monitoring
13. Using data to achieve good outcomes

24
11.Using data to support individuals

What is critical to remember? Secondly, to achieve this, staff need to bring


Our purpose for processing vulnerability together all the information they have on a
data is ultimately to help our customers. customer’s vulnerable situation, alongside
any key financial activity data including:
Therefore no matter how well-designed
or DPA compliant our processing may be,  information from customer discussions:
how we practically use this data is key.
 often captured using tools such as
In this section, we briefly consider how TEXAS or similar protocols
firms can turn customer data into action,
and aggregate insight into intervention.  stored in vulnerability flags, support
need codes, and account notes
And we also point to other resources
that firms can use to achieve this.  additional evidence provided by a
customer (e.g. Debt and Mental Health
What should we do? Evidence Form, or similar written letters)
Firstly, supporting a vulnerable customer
requires a firm to establish exactly what  evidence provided by an authorised
difficulty a customer is vulnerable to? third-party (e.g. debt adviser/customer
with power of attorney), or a third party
As explained in Guide 1, this can include:
without authorisation (e.g. temporarily
 acting on specific problems that directly captured using the CARERS tool)
make it harder for a customer to fairly
 financial activity information such as
choose, purchase, access, use, talk
income and expenditure data.
with, complain about, pay for, or
benefit from a product or service Thirdly, staff and firms need to use these
e.g. customers who may not be able data to decide on their practical response:
to communicate their needs or access a. what standard actions are open to us?
additional explanation or information (i.e. those we’d take for any customer)
 acting on problems where a customer b. will these standard actions help address
has a support need that goes beyond the problems a customer has disclosed?
what a firm can offer, and where (i.e. how might these help ‘as is’?)
signposting, referral, or partnership with
an external specialist agency is needed c. what adjustments to standard practice,
or entirely new actions, would help?
e.g. customers who have physical or (i.e. what changes need to happen?)
mental health problems that require
specialist health care interventions d. if making an adjustment, what needs to
happen during the current customer
 acting on problems not directly related
contact, directly after, and in the future?
to a product or service, but where these
require a firm to adjust their practice Lastly, firms then need to take action for
e.g. customers disclosing suicidal that individual customer (and in doing this,
thoughts or behaviours not related to record any relevant information about this,
a product, but where a firm needs to so that any adjustments or actions are not
tailor future interaction and contact. forgotten or overlooked).

25
FIGURE 7

What is the customer What information can


vulnerable to? we bring together?

What standard
options are What are the ‘Business as Usual’ actions that we can take
open to us? with any customer (not just those who are vulnerable),
Will these help and which might address the difficulties a customer is facing.
the customer?

What
adjustments  Take more time  Minimise the amount of
 Use simpler language paperwork to complete
could we  Offer reassurance about
 Find a better time of
make? day to make contact how a customer’s
or  Allow contact through information will be used
an alternative channel  Work with a 3rd party
What new  Use the BRUCE tool to  Signpost to specialist
actions could support decision making external services
we take?

What action
is needed:
- now?
- in the future?

Take action Record relevant


information

26
12.Using aggregate data for monitoring

Specific products or features


What is critical to remember? Some firms will have developed products
The FCA has clear expectations about or features that are specifically designed
using data to both understand customer with vulnerability in mind.
needs, and monitor activity over time:
These may include, for example features
“Firms should understand the nature in a banking app that allow customers to
and scale of drivers of vulnerability… in self-disclose a vulnerable situation.
their target market and customer base.”
Or they may involve a ‘gambling blocker’
“Firms should understand the impact
mechanism on a current account that can
of vulnerabilities on... consumers.” be activated by a customer to prevent
“Firms should implement… processes to expenditure on gambling activities.
evaluate…where the needs of
Whatever the additional feature, firms
vulnerable consumers are not met, so
will want to establish basic metrics
they can make improvements”.1
around their use, as well as their impact.
To do this, firms can use aggregate data
– key indicators pooled together from Data protection indicators
multiple customer cases – to provide the It can be useful – as Guide 2 notes – if
management information required. firms know how many customers have:
 refused consent
What aggregate data do we need?
 withdrawn explicit consent
KYVC (know your vulnerable customers)  been unable to give explicit consent.
Firms need to have basic data indicators
Firms will also want to record when they
in place to describe their (known)
have been unable to obtain such consent
vulnerable customer base.
(e.g. customer was not contactable) and
This includes the: another processing base was used.
 number of vulnerable customers Taking these steps will both meet the
 what the customer is vulnerable to GDPR accountability principle, and allow
firms to establish just how prevalent
 causes of vulnerability (FCA drivers) consent refusal and withdrawal is.
 main types of support need.
Other indicators
Here the causes of vulnerability include Firms may also wish to use other data
the four ‘drivers’ identified by the FCA indicators to monitor their treatment of
(health conditions, life events, financial vulnerable consumers for the ten
resilience, and financial capability), as examples set out by the FCA (Figure 8).
well as other causes that a firm wishes to
capture (e.g. mistakes made by a firm, Outcome data
or wider economic or social conditions). In addition to describing the key actions
taken with a vulnerable customer, firms
Critically, firms need to have indicators will want to also record their outcomes
that describe support need, and whether (what difference the actions made), and
these needs have been successfully met. we address this issue in the next section.

27
FIGURE 8
“Firms should
produce, and
regularly review,
management
information, C. REVIEWING
A. QUALITY B. CUSTOMER
POLICY
appropriate to ASSURANCE EXPERIENCE
the nature of its
business, regarding
the outcomes for
Establishing quality Testing experiences of Reviewing whether
vulnerable
assurance processes that vulnerable customers processes and policies are
consumers.” identify areas that require through processes such effective in the fair
improvement. as mystery shopping, treatment of vulnerable
auditing, focus groups customers.
and deep dives.

D. STAFF E. COMPLAINT F. EVALUATE G. PRODUCE


FEEDBACK CHANNELS IMPACT AND MANAGMENT
OUTCOMES INDICATORS

Allowing staff to feedback Ensuring it is easy for Using information on Provide Senior
anonymously when they vulnerable consumers to firm’s treatment of Management or the
think processes for make complaints, and vulnerable customers and Board with reports on
vulnerable consumers through multiple the customer’s progress and provide
could be improved. channels. experience to help inform challenge where
understanding of appropriate.
effectiveness of policies,
processes, training and
controls in place.

J. USE
H. FEEDBACK I. DEEP MANAGEMENT
DIVES INFORMATION

Producing MI that
Use feedback that may Select particular products,
captures outcomes for
not be directly sent to the processes or types of
vulnerable customers,
firm, including online vulnerability for ‘deep
and making sure it is
reviews and social media dives’ to help better
discussed regularly at an
complaints. understand where to
appropriate level, and
focus its services or make
improvements. escalated and acted on
where necessary.
28
13.Using data to achieve good outcomes

What is critical to remember? What outcomes should we use?


When it comes to vulnerability, the FCA
It is beyond this guide’s scope to list all
is clear on what firms need to achieve:
the outcome measures firms may use.
“[vulnerable consumers should] Instead, a firm’s outcome choices should
experience outcomes that are as good hinge on the products and services they
as those of other consumers” 1 offer, and the processes they operate.
Consequently, firms need to consider In doing this, firms will need to consider
what outcome measures are of the most the changes they want to see (or might
use in making such comparisons. expect to see) in customer activity.
What is an ‘outcome’? Firms may also want to build some of
In simple terms, an outcome is either a: their measures around the six consumer
outcomes the FCA places at the heart of
 change (something happened)
treating customers fairly:1
 no change (nothing happened)
a. consumers can be confident they are
 that flows from a specific firm action, dealing with firms where the fair
policy or intervention. treatment of customers is central
Customer outcomes b. products and services… are designed
Outcome measurement focuses on to meet the needs of identified…
whether a change took place (or not). groups and are targeted accordingly
This might involve a customer turning on c. consumers are provided with clear
a ‘gambling block’ on their banking app, information and...kept...informed
or never using this function at any point. before, during and after..point of sale.
It could feature a customer keeping to a d. where consumers receive advice…this
repayment plan following a conversation …is suitable and takes account of
with their creditor, or failing to do this. their circumstances
Or it may involve a customer registering e. products perform as...consumers
a complaint about the introduction of a expect, and…the…service is of an
new design for account statements. acceptable [and expected] standard
What is key here is that a firm considers: f. consumers do not face unreasonable
post-sale barriers…to change product,
 whether a specific action – such as
switch provider, submit a claim or
introducing a new process – results in
make a complaint.
defined change at the customer level
These provide a starting point for data
 whether customers in vulnerable
collection, and comparison between
situations are negatively affected or
customers, rather than a last word.
disadvantaged by this (compared to
customers who are not vulnerable). Similarly, where data are collected, firms
may wish to consider any differences in
To do this, firms need to be clear on how
outcomes that exist between different
they define their outcome measures,
groups of vulnerable consumers.
and also what they expect to happen.

29
PART C: ENCOURAGING DISCLOSURES

14. What is a disclosure environment?


15. How do we build one?

30
14. What is a disclosure environment?

What is critical to remember? What is a disclosure environment?


When developing a vulnerability strategy, Disclosure environments are based on three
firms can often find themselves thrust into simple and linked premises:
immediate discussions about identification.
 it is often easier for a customer to tell a
This often starts with how staff can ‘spot’ firm about their vulnerability, than it is
signs of vulnerability, shifts into the ethics of for staff or a process to identify this
using transaction data, before ending with
the challenge of self-serve online platforms.  customers will be more likely to make
such disclosures when firms give clear
However, while identification is a key pillar signals, explanations, and reassurance
of any strategy, it is never the only pillar. about how their data will be used
Instead, firms should consider the ‘lines of  to give these clear signals, firms need to
defence’ that lie before identification, and understand the barriers that currently
how these can help vulnerable customers deter their customers from disclosing.
(Figure 9).
Consequently, disclosure environments are
In this section, we explain how disclosure about more than providing a one-way ‘pipe’
environments can provide such a ‘line’. into a firm for consumers to share detail.
Instead, they also involve a firm sending
. messages, information, and signals about
the process and benefits of disclosure.
To illustrate what this practically looks like,
this section presents three different
models of disclosure environments.
It then describes some of the key factors
firms interested in developing their own
disclosure environment should consider.
The section then concludes with thoughts
on the overall strengths and limitations of a
disclosure environment approach.
“a disclosure environment involves a
firm actively designing its processes,
practices, and communications to
encourage and help consumers tell the
firm about any relevant situation
making them vulnerable to harm, and
where the consumer is shown not only
why they can trust the firm with this
information, but also the specific
benefits such a disclosure could bring”

31
FIGURE 9

Accessibility – firms must ensure this involves a firm engaging in


A vulnerable customers can equally proactive and inclusive design so
access their products/services. customers don’t need to ask for help.

DE Disclosure Environments – firms this involves customers taking the step


must make it easy for customers to disclose, and firms sending
to disclose their support needs. reassuring signals about disclosure.
Identification – firms must work
I
across all their channels and data this involves a firm working across its
to identify vulnerable customers. audio, physical, and digital channels to
identify, engage, understand, and
E Engagement – firms must ensure
support customers.
staff can move from identification
to ‘cold’ starting often quite
sensitive conversations.
DM Disclosure management – firms
need to handle disclosures with
practical and compliant tools.
Understanding – firms need to
U
listen and establish the relevant
information to help a customer.
Support – identification and
S understanding that does not lead
to the reasonable provision of
support is a hollow process.
Recording – firms need to record
R
the absolute minimum of the
most relevant data for action, in a
clear, transparent, and fair way.

Internal support – where needed,


IS
a firm should signpost to internal
specialist support.
External support – where needed,
ES a firm should signpost to external Firms cannot do this alone – there will
services providing specialist help be limits to their expertise and
and support that a firm cannot. responsibilities, and they need to work
with external agencies when these
Monitoring – firms should limits are met.
M monitor a vulnerable customer’s
situation, respond to changing Vulnerable situations change over time
need, and keep data up-to-date. – firms therefore need to watch and
monitor a customer’s situation
32
15. How do we build one?

Where do we start? Critically, when asked why they had not


Before starting to build a disclosure disclosed, participants reported:
environment, firms need to understand the
reasons for consumer non-disclosure.  they weren’t aware it would make a
difference (60%)
Understanding these is key in a firm taking
steps to address any barriers to disclosure  disliked telling people about their
within their own processes and systems. health problems (55%)

Understanding the barriers  felt they would not be treated


Firms can start by: sensitively/sympathetically (52%)

 reflecting on what they already know  were concerned how the


about their customer base, journeys, information would be used (40%)
information, and contact channels.  were worried that disclosure would
This involves reviewing whether any affect future access to credit (35%)
aspect of these may deter or prevent a  thought they wouldn’t be believed
customer from disclosing a vulnerability. (31%)
In particular, firms should think about  thought they’d be treated unfairly
the signals being sent to customers (30%)
about how to disclosure, the benefits  were concerned that any debts
of doing this, and to reassure them would be repaid from benefits (7%) .
about any perceived risks.
Critically, each of these represents a
 drawing on research on what is already
potential barrier to disclosure.
known about vulnerable customers
and disclosure. However, firms who understand this
may be able to address, prevent, and
In 2016, for example, the Money and
ultimately over-turn these barriers.
Mental Health Policy Institute ran an
online survey with 5,413 people with To do this, firms will need to directly
experience of mental health problems.8 address the concerns customers have
Participants were asked if they had about disclosure, and counteract these.
disclosed their mental health problem By offering clear explanation and
to any company that they owed money reassurance about how exactly the
to (including organisations within, and information they have shared will be
outside of, financial services). practically used, these perceptions may
The study found that out of nearly be overcome.
4,000 participants answering this  learning from the actions taken by
question, eight-out-of-ten reported that other firms to encourage disclosure.
they had not disclosed this information
to a creditor (78%; 3027/3901). Figures 10, 11, 12, and 13 (following
pages) describe four different models
that the financial services sector are
8. Money and Mental Health Policy Institute (2016). In Control.
adopting or developing to encourage
disclosure and facilitate support.
33
FIGURE 10
Launched in September 2018, the ‘share with us’ initiative
aims to give the over 4.6 million customers of Monzo
bank a simple, direct, and always available mechanism to
disclose “any situation – temporary or permanent – that
affects the way you manage your finance”.
Offering its banking services via a mobile phone app, this
mechanism allows customers to provide a free-text
description of their situation to Monzo at any time of day.
This goes directly for review and potential response to
Monzo’s Vulnerable Customer Team (who can direct the
customer to guidance or resources to help with their
situation, or where a more detailed conversation can
begin via chat or an accompanying telephone service).
While one aim of the ‘share with us’ initiative is clearly to
make it simpler for customers to disclose a vulnerable
situation to Monzo, considerable thought has been given
in the initiative to the way the new function has been
presented and introduced to customers.
This is reflected in the language used within the banking
application which aims to normalise and de-stigmatise
disclosure.
The feature is located within the help function of the
Monzo app, and customers are also guided to it if they are
reading a relevant help article (see Monzo’s ‘helping us
understand your needs’ - https://monzo.com/help/your-
needs).
Monzo has gradually introduced the service and tested its
operation and with time, plans to evaluate whether this
‘share with us’ mechanism could be introduced as part of
the onboarding/application process for new customers, or
through other more prominent sections in its app.
Much of this will clearly depend on the capacity of the
Monzo Vulnerability Team to deal with the volume of
incoming disclosures. The team speaks to around 100
customers a day, and disclosures through ‘share with us’
make up around 16% of this.
The top three disclosure types that come through ‘share
with us’ for Monzo relate to financial difficulties, mental
health and gambling addiction, though there has been an
increase in its use to disclose financial and domestic
abuse, since it’s a safe form of communication to the
team that leaves no trace in the app.
34
How do we get buy-in? There are no specific data that relate to
While often recognised as a ‘good idea in this issue and disclosure environments.
principle’, firms can be discouraged from However, research has been conducted
building their own disclosure environments with front-line debt collection staff
by underlying management reservations. about consumers using vulnerability as
Recognising these from the outset is an excuse or ‘card’ to gain advantage.9
therefore key as it then allows firms to take This found that in 2016, 5% of staff felt
a ‘test and learn’ approach where concerns ‘many customers’ claiming to have a
about, for example, capacity to handle an mental health problem were disclosing
increase in the volume of disclosures can be this as an excuse to avoid repaying debt,
quantified to establish their actual (rather compared in 2010 to 14% of staff (in the
than feared) impact on operational activity. same set of financial service firms).
Among the most common reservations that While this tapered perception over time
firms may encounter include: may reflect shifts in societal perceptions
 concerns about a spike in the volume of on mental health, it is also likely that the
disclosures (including disclosures not now well established programme of
relevant to a firm’s core business, or work on vulnerability and encouraging
their ability to support a consumer). disclosure within the financial service
sector has also reassured staff about
While understandable, firms can consumers ‘gaming’ the system.
counter such concerns by gradually
introducing mechanisms for disclosure  fears about consumer expectations,
into their operation, or testing these and staff ability to meet these – firms
mechanisms with a subset of consumers often have fears that introducing a
(rather than the whole consumer base). disclosure environment will raise the
expectations that consumers will have
This approach is reflected in the work of the support that can be given.
that Monzo took in placing their ‘share
with us’ feature within the help function However, as seen in the Barclaycard
of their banking app. This allowed the example in Figure 11, clear messaging
feature to be evaluated and further about both what help can be given by a
resources developed to support firm, and what support can be provided
customers who disclosed (including by external partners, can help to
filtering-out irrelevant disclosures), counter-act this.
before deciding whether to move this  the need for perfect solutions to be in-
into the central onboarding/new place, rather than a ‘test and learn’
customer application stage. approach – firms can be dissuaded from
 worries about consumers using such introducing a disclosure environment
mechanisms to ‘game’ the system – approach by the view that they need to
fears that consumers who are not in a introduce a perfectly and fully designed
vulnerable situation will make use of environment from the outset.
disclosure mechanisms to gain an However, adopting a more gradual ‘test
advantage of some form are a concern and learn’ approach is likely to be more
among some firms. beneficial, in terms of understanding

9. Fitch C, Evans J, Trend C (2017). Vulnerability: a guide for debt collection.


www.moneyadvicetrust.org.uk/vulnerability 35
FIGURE 11

Launched in 2017, the Barclaycard ‘Money Worries Hub’


focuses on the signals that the organisation gives to
customers who are in a vulnerable situation due to
financial difficulty and other factors.
Critically, the Hub aims to reassure customers that taking
steps to disclose their vulnerable situation, and seek help
as early as possible, would result in concrete benefits.
Barclaycard recognised that a gap existed in its current
suite of resources, and what was needed was a resource
that wasn’t just about ‘reading information about the
importance of making contact’ but which made customers
aware of how people like them had been helped.
Consequently, Barclaycard worked with its customers and
external partners to develop the ‘Money Worries Hub’
which highlighted common situations that customers
might experience ranging from job loss and relationship
breakdowns to bereavements and medical conditions.
Each of these vulnerable situations – such as Carl’s
experience of unemployment - is presented in a ‘story’
format outlining the difficulties that customers might
face, but importantly walking through each of the actions
Barclaycard will take when a disclosure is made to them.
Importantly, each of these also recognises the fears and
concerns that customers have about sharing information
like this with Barclaycard, with an emphasis being placed
on addressing these fears and explaining the benefits of
what will happen if a customer makes a disclosure.
Throughout the Hub, this format is key to encourage
customers to disclose and share their circumstances and
difficulties, and making them aware that Barclaycard has
helped people in similar circumstances before.
In doing this, Barclaycard are doing more than simply
providing a number of ways in which to make contact
with them, but instead have actively worked to create an
environment in which customers feel secure and
reassured that disclosure will have positive benefits
(rather than punitive consequences).

36
‘what works’ for a firm’s consumers, and Summary
managing demand and capacity to meet The introduction of a disclosure
disclosed need. environment approach is premised on the
 does our firm have a strong sense of simple rationale that it is easier for a
the different internal support options consumer to tell a firm about a vulnerable
that can be offered to consumers who situation, than it is for a staff member or
do disclose? process to identify this.

Clearly, this not only applies to specific As we have also seen, such environments
disclosure environment approaches, but can only work where they recognise that
also more generally to any disclosure of consumers will only share such information
vulnerability that is made by consumers if firms understand the known barriers to
to a firm. disclosure, and offer clear reassurances
about the risks that consumers perceive
This is dealt with in more detail on page from talking about their vulnerable
14 (‘Support codes’) which refers to situation.
wider guidance on support, and also
covers anticipating and meeting Where implemented, firms have reported
consumer support needs. that consumers will voluntarily disclose
information about their situation that was
 what signals and messages about the not previously known.
process and benefits of disclosure can
we send to our consumers (and how Furthermore, sending clear signals to
will we achieve this)? consumers about the process and benefits
of disclosing different situations is vital.
As noted earlier, the messages that are sent
While disclosure environments cannot
to consumers about the process and
represent the whole of a vulnerability
benefits of disclosure are key.
strategy (particularly given that some
However, these signals can be given via a consumers will be unaware of their
range of channels and can begin before the vulnerability to harm – as is the case with
consumer even gets in contact – written consumers with undiagnosed mental health
reassurances on websites, leaflets and problems ), an accompanying proactive
posters, for example, can be used to remind identification strategy is also vital.
consumer at an early stage that all
However, the development of disclosure
situations are up for discussion.
environments (on a ‘test and learn’ basis)
Furthermore, small reminders and ‘nudges’ provides an opportunity for firms to add
from staff in routine correspondence or another tool to their battery, make a clear
conversation with consumers can also public statement that they recognise the
reinforce this (e.g. “is there anything else realities of their lives that many of their
that you’d like to tell us about your consumers are living (and are willing to
situation”, or “are there any health or other listen, and take these into account where
issues we should know about, as we will the option exist), and most importantly to
treat these confidentially and they will help reach consumers in vulnerable situations
us to provide you with a better service?”). who may have previously been unknown to
the firm.

37
FIGURE 12

Firms often overlook the opportunities for self-disclosure


afforded by the onboarding process.
Not during an application
It would be optimistic to expect a potential customer to
disclose either a vulnerable situation or support need
during an actual live application for a product or service.
This is because a customer is probably not going to want
to share any information they perceive might be used as a
basis to decline their application.
Welcome onboard!
However, once a firm has decided to accept a potential
customer’s application, an important opportunity arises.
Here, it is possible to give a customer the opportunity to
share any relevant support need or important information
about their situation.
This can include a free-text box for a customer to
complete, or a selection of fixed-choice support needs.
Knowledge from the outset
Critically, taking this step can help firms to understand
their vulnerable customers’ needs from the outset – and
this will help enormously in service design and delivery.

Welcome to Your Card!


Patrick is there anything you’d like to share?
Your new card and account are now approved.
But we’d like to give you some extra help (if you want it).
Is there anything that affects the way you manage your
money, or how you might use your new card?
This could be something that makes managing money
difficult, makes it harder to communicate with us, or
where you might need someone else to help you.
A lot of our customers tell us about these things, and we
always try to help them, so please do share with us.
SHARE WITH US HERE:

38
FIGURE 13

The WelcoMe customer service assistant was launched in


2018.

WelcoMe puts the customer in control of the information


they disclose to the venue staff relating to their disability
and any access and communication requirements.

Allowing this disclosure helps to create both foundational


relationships and personalised and empathetic customer
service interactions.

WelcoMe uses a visitor’s mobile phones location services


to provide the venue they are visiting with personalised
accessibility information. This includes an image of the
consumer, and information on the condition the visitor
would like the service team to have awareness of.

It also offers the venue top tips on interaction, prior to


the arrival of the customer. The user can add additional
specific information for their visit on that day along with
any additional information required (i.e. the need for a
ramp, an interpreter, a hearing loop etc. It can also be
utilised to provide information on the latest COVID
procedures and service provision).

WelcoMe is provided as a cloud based solution for venues


and the user information is retained within the user
profile and only shared with venues when the user has
planned a trip to a specific branch.

This enables the user to be in full control of when and


with whom they share their support needs.

Once a visit has been completed the user information is


retained by the user for future visits and the venue access
to the users data is removed until the next visit.

In this way, WelcoMe is also used as an internal staff


training tool by providing staff with direct access to
information covering a wide range of disabilities and
conditions. This information is contained within the CMS
and is provided by relevant charities.

Currently the app is installed across the UK in venues that


include NatWest, Edinburgh Airport, Deloitte and Diageo
the platform is gaining traction and seeing more users and
venues start to use the platform.

39
PART D: SUMMARY

16. What should we do next?

40
16. What should we do next?

In this guide Where next?


In Guide 3, we have considered the There are currently three guides in this
choices faced in recording vulnerability series on GDPR and vulnerability.
data, using vulnerability data, and
While firms should work to apply the
encouraging vulnerability disclosures.
content of these guides to their own
Data processing challenges, others should look to fill the
We have described why firms need to gaps in what has not been covered.
work to collect the absolute minimum of
This includes the need for guidance on
the most relevant data for action.
processing criminal offences data, for
We have explained why firms should use using transaction data to identify both
a trinity of multiple vulnerability flags, financial and non-financial vulnerability,
support need codes, and contextual and also ensuring that data protection
account notes to record data. processes comply with the Equality Act.
And we have explored why firms need a This guidance should come from
‘retention rule of thumb’ (so any data on partnerships between firms and charities
vulnerability remains accurate, relevant, working with vulnerable people, as they
and still of practical use when needed), will know the challenges posed in both
and the role of Data Protection Impact commercial and personal terms.
Assessments when sharing data (both
externally and internally). What is critical to remember?
Our final message is a simple one.
Data use
Importantly, Guide 3 has also looked Firms should always remember that the
more broadly and considered how firms data we want to process always comes
can best use data to help individual from real people with real problems.
customers, and also ensure they really Consequently, these customers will be
Know Your Vulnerable Customers. more focused on solving these problems,
Data generation rather than invested in reading our
Finally, Guide 3 has also looked to the privacy notices or leaflets (no matter
future and underlined the importance of how carefully worded).
firms actively encouraging disclosures of These customers will often also be less
vulnerability to them. aware of the rights and principles of the
This involves disclosure environments GDPR than ourselves, and may also need
being developed that make it simple for additional help to follow our processes.
customers to tell firms about a support For this reason, we have to ensure our
need, and send reassuring messages, GDPR policies have an understanding of
signals and explanations to customers vulnerability running right through them.
about what will happen to their
And such an understanding can only
information if they did disclose to a firm.
come from Data Protection Teams and
vulnerability policy specialists working
together, rather than – as is the case in
many firms – in separation.
41
This is a joint publication from the Money Advice Liaison Group and the Money Advice Trust.

© November 2020

The moral right of the authors has been asserted. All rights reserved. Without limiting the rights under
copyright reserved above, no part of this publication may be reproduced, stored or introduced in a retrieval
system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or
42
otherwise), without the prior written permission of both the copyright owner and the publisher of this report.

You might also like