How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the high failure rate of CRM systems - poor data quality - is also one of the easiest to avoid. Your CRM software is only as good as the information it contains. As the old programmers motto goes 'garbage in, garbage out'.

So how can you avoid incomplete, incorrect, irrelevant or out-of-date and generally unfit-for-use data from permeating your CRM software?

You need to gather your key CRM users together and thrash out a DATA CAPTURE PROCEDURE document, defining the rules of use.

Spell out:

? Who has what rights to the system; who can Create, Insert, Modify or Delete records, assuming your software supports all these functions? Forward this information to your system administrator to action.

? Decide on a procedure to check for any duplicates before creating a record. Depending on what 'de-duping' or 'data scrubbing' features your system has, this might require some simple searches before starting a new record.

? Do you allow abbreviations or acronyms? For example: IBM, or I.B.M, or International Business Machines Inc. or Incorporated and so on. A policy on ensuring consistency of input will help to avoid duplications in future.

? Are records going to be created in Upper and Lower case and when are CAPS acceptable?

? By when do you expect records, notes and so on to be created or updated? Same day, on return to the office?

? Check to see whether your Postal Services have specific requirements. Ensure your data meets these criteria.

? Is the primary address of clients to be created as a postal or a physical address?

? Make sure everyone checks spellings if they are unsure and do not trust spellchecker! When in doubt, ask the client ? they'll respect that. Is it Clark with an 'e'; Shawn, Sean or Shaun? One certain way to get your mail binned is to spell someone's name incorrectly.

? Also confirm the kind of corporation e.g. LLC, Inc, PTY Ltd. and so on.

? Make rules for creating new profiles or User Definable Fields (UDF) (or whatever your specific CRM software calls them.) Place a lot of emphasis on this. Every time a new UDF is needed, it should first be approved. Otherwise duplicates will permeate your database e.g. Lead Source: Yellow Pages, YP, yelo pages.

? Ensure that email addresses are put in correctly. Basic but common mistake!

? Set up procedures, if not supported by your software, of how to create records from inbound emails.

? If applicable, are you going to use Mandatory/Forced fields?

You might as well address the issue of Backups while you are about it.

? Who is the responsible person for backing up your databases/s? Who covers for them when they are absent or unavailable?

? How frequently are backups to be done? Diarise!

? How are backups done e.g. by the Grandfather, Father, Son method.

? Ensure backups are made on good quality CD's or whatever format you are using. It's no good doing a backup, then finding on attempting a Restore that it doesn't work! It is also a good idea to copy backups onto more than one data format.

? Where are the backups to be stored?

? Are the backups secure? This is important for both security and practical reasons.

Once your Data Capture Procedure Document is finished, get everyone to sign it off as READ! As standard practice, ensure that document is handed to all new employees at your company. Refer back to this document for possible revision every three months or so.

Try this: select a couple of records - both good and bad - every week, to put on the overhead at staff meetings. Make sure you don't unduly embarrass anybody but watch this become the light-relief highlight of your meetings! People learn best when having fun!

What if your database is in one unholy mess?

Has the rot set in so deeply that your database needs a complete overhaul? Turn this seemingly insurmountable task into an opportunity to you. This is an excellent excuse to re-establish contact with your clients and let them know you care. You can always put lapses down to data crashes but tell them you have fixed the problem!

Importantly, help your staff understand what you need from the data to facilitate more accurate marketing and reporting and hence the success of your business and their careers.

By creating a sense of pride and ownership in the company database, you are nurturing the essential process of buy-in, necessary for the success of your CRM initiative. Don't compromise this critical tool by allowing your CRM software to be infected by inferior data.

About the Author: Perry Norgarb has specialized in Small Business CRM solutions for the last 15 years.

Contact him or find out more about CRM, Contact Management and other Sales Tracking software tips and solutions for small businesses at: http://www.smallbizcrm.com

You are free to re-publish this article as long as this bio box and copyright remain intact. ? 9 March, 2004.

cleaning help near Mundelein ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

MSN Messenger Is A Sweet Way To Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Microsoft Great Plains implementation: Restaurants Supply Chain Management Example

Microsoft Great Plains serves majority of US based horizontal and... Read More

MCP Market News: Microsoft SQL Server & SQL Reporting Services

Are you ready? SQL Server 2005, the next-generation data management... Read More

eConnect: eCommerce Development for Microsoft Great Plains

Microsoft Business Solutions Great Plains has several options to enable... Read More

Microsoft Great Plains eCommerce: overview for developer

Microsoft Business Solutions Great Plains was designed back in the... Read More

Introduction To ISDN, Part III: PAP

Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More

The Tools and Features of Adobe Photoshop

Adobe Photoshop is one of the world's leading graphics editing... Read More

Groupware and Online Collaboration: Collaboration Series #4

This article is the fourth of a series of articles... Read More

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Cisco CCNA Certification: Becoming A Truly Valuable CCNA.

I've been active in the Cisco Certification track for four... Read More

Microsoft CRM Customization

Microsoft CRM customization techniques are very diversified and based on... Read More

Helping Newbies Understand Professional Software

The Windows registry is a huge database that ensures normal... Read More

Software Companies: Generate New Revenue Streams and Decrease Costs with Custom e-Learning Content

It's no secret that software companies operate in a very... Read More

Software Piracy

SOFTWARE PIRACY We regularly hear reports... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

The Hidden Power of Online Manual

Writing software manuals is boring, isn't it? We often think:... Read More

Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur

I started using PIP (Picture It Publishing) Platinum 2002 right... Read More

Does your Company have Documentum?

Are you lost in the mess of documents that get... Read More

Dig Out That Worm

Internet worms. Is your PC infected?If your computer has become... Read More

Microsoft Great Plains Implementation ? Overview for IT Director/Controller

What is installation in the language of technology? Installation... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

10 Ways to Learn a Software

Following tips help you to learn a software in lesser... Read More

reliable maid service Wilmette ..