Vulnerability
Across
- 1. We can use the _____ model to help deal with a third party calling to advise of a customer's vulnerability (5)
- 4. TCF Treating Customers ______(6)
- 6. (TEXAS) ____ the customer (5)
- 8. we must keep ____ (from harm) (4)
- 9. we need to ____ for authority (5)
- 11. we need to _____ (to focus)(5)
- 14. The ___ model helps by ensuring you're questioning the vulnerability and circumstances appropriately. (4)
- 15. _____ consent should be obtained(8)
- 17. The ____ model is what we follow when a customer divulges information to us about a vulnerability
- 18. we then _____(with summary)(3)
Down
- 2. we must _____ discussing any account details(5)
- 3. ____ how the customer's information will be used (7)
- 5. we must _____ the carer's observations (6)
- 7. we need to ______(to discover)(3)
- 8. ______ the customer to appropriate support organisations (4,4)
- 10. the _____ model helps us when speaking with customers who may be suicidal(5)
- 12. ___ the customer questions (3)
- 13. We can use the ______ model to help us identify vulnerability (5)
- 16. we need to ______(to understand)(6)