Businesses use their own verification methodology to determine how to treat an individual where vulnerability has been identified and, where appropriate, will seek further information. We are highlighting vulnerability but the way somebody is managed will ultimately be down to the service provider and be influenced by the type of business and the sector in question.
Where we are advised of vulnerability as a result of a Power of Attorney, we validate that Power of Attorney.
Much of our data is sourced from third parties and consequently is already validated:
• We receive data from local authorities, solicitors and estate management companies and typically a validated Court of Protection Order will be in place whereby the individual lacks the mental capacity to manage their own financial affairs.
• Organisations with which we have a contractual relationship will provide data to us where there is a legal basis to do so and will only be provided where there is sufficient evidence to justify registration.