Feeds

Credit Management meets computer automation

A necessary balancing act. A risky business

Top 5 reasons to deploy VMware with Tegile

Shortly after Easter, a newly installed computer system sent out red letters to over 3,000 Derby City residents who had already paid their Council Tax. There were howls of outrage, and an obligatory computer error excuse from the Council. Matters were then compounded as angry residents tried contacting the Council to put the matter right - and found themselves blocked by an automated call system.

Michael Aubrey, from Derby, was threatened with a demand for immediate payment of over £1300 if he did not sort matters out within a week. However, he said: "I rang all the numbers on the form and all you get through to is an automated payment line, where you can't talk to anybody and say I've already paid."

This is the downside of computer automation in one of the most sensitive areas of commercial interaction: credit management. Unless we pay for everything in cash or up-front, it is an issue that will affect us all at some point in our lives.

Like so much else in business, credit management is a balancing act. At one extreme - mostly in the retail sector - are businesses that do not give credit at all. They minimise the possibility of incurring bad debt - but in so doing, they probably fail to maximise store turnover, losing purchases from those who do not have the money to pay right away.

At the other end are those business that exist solely on credit: They provide goods and services before any monies are received. And therefore their success is wholly dependent on their ability to manage the associated credit risk. Many businesses, of course, fall between these two extremes.

According to Neil Monroe, External Affairs Director at UK Credit Referencing, Equifax, best practice relies on implementing a traditional view of the consumer lifecycle. That is, businesses need to balance risk and profitability, while recognising there is no absolutely right answer: What works for one may not work for another.

Best practice also includes segmenting prospects before they become customers - and then managing customers on an individual (or segment) basis throughout their time with an organisation. Thus, some thought needs to be given as to whether an individual is going to be a "good customer" at the point of recruitment - not six months after they have become a customer and owe hundreds of pounds that they are unlikely ever to repay.

The level of credit granted should reflect the same factors, as should the approach to individuals whose accounts have started to pass into delinquency. Some of those who are presently not paying can pay, but won't: Some simply can't, but with a little help and careful management could revert to being model customers in future.

Businesses need to recruit "goods" - individuals who spend a lot and pay on time - and reject "bads." Ultimate success or failure depends on how they manage those who sit between these two extremes - the "greys" - who may spend a lot but be highly risky in terms of payment or pay mostly on time, but spend very little, so ultimately wiping out any profit margin through admin costs.

A major issue that el Reg has encountered is that businesses do not always succeed in applying such an integrated approach. The Marketing Department see their task as bringing in new customers, more orders, no matter what: The Credit Section see their function as safeguarding the bottom line. In essence, they are assessing customers according to two different sets of criteria - and in the worst cases, creating serious systemic problems for their organisation.

In one hi-tech company, this problem was so acute that canny customers eventually worked out that the quickest way to obtain 6 months free subscription was to default on a payment - because marketing would do anything in their power to prevent the customer count from reducing.

Top 5 reasons to deploy VMware with Tegile

Next page: The date beneath

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.