- Reports to monitor data integrity
- Identify incomplete addresses, email addresses and cities etc
- Duplicate name clean-up and training
- Review purge parameters and process
- Procedures for proper data entry
- Staff training on proper search procedures
- Review security setups and procedures for each application
- Provide activity analysis of customers
- Review customer privacy and contact flags
