Feeds

Credit Management meets computer automation

A necessary balancing act. A risky business

Boost IT visibility and business value

Recession shakeup

Matters have been shaken up by the recession. Red lining - the practice of simply refusing to offer certain products on the basis of where people live - has long been outlawed by the Office of Fair Trading (OFT). However, there is an ongoing debate around issues of financial exclusion: The fact that it is often the poorest in our society who pay most for credit. Government - and in particular the Department of Business and Enterprise (BERR) - is concerned with how business grants credit: a Consultation on the implementation of the consumer credit directive is under way. And there has been much focus on what are considered to be bad or irresponsible credit handling habits.

One danger of tightening up credit controls now is that as we emerge from recession, the number of individuals categorised as "greys" by financial and other concerns will be much enlarged. Many individuals will have blotted their credit copybook - and the industry will need some latitude in order to bring these individuals back to the fold.

Philip King, Director General of the Institute of Credit Management, is well aware of this issue. Talking to The Register, he said: "The reality is that with less funds available from banks, the solution for many businesses is to beef up the flow of cash into the business.

"Some businesses are being draconian, reacting - or over-reacting - to present circumstances. Smart businesses are looking at their customer portfolio, working out who pays regularly and well, whilst looking more closely at those who represent a higher degree of risk.

"The best approach may be to reduce payment terms, whilst giving something in return: Simply demanding faster payment, mismanaging the relationship in any way, may store up problems for the future, when the economy picks up again."

At base, he recommends against businesses just getting tougher. Best practice, he observes, is about segmenting and dealing with individuals. He adds: "Automated systems are a good way of driving activity, but they should never overtake thought. There will always be a need for rational judgment."

Additional tips on how to manage cash flow and credit - possibly more relevant to the B2B environment - can be obtained from a series of guides put together by the ICM and BERR.

Build a business case: developing custom apps

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.