ApplicantApplicant A user of a program front-end portal generally receiving a benefit or service.
A user of a programProgram A set of coordinated activities, projects, or services for which this software facilitates customer and vendor account creation and maintenance, communication, product inventory, accounting, and payments. front-end portal generally receiving a benefit or service.
AssessmentsAssessments An energy assessment performed by an assessor to determine whether a customer is eligible for a particular program benefit.
An energy assessmentAssessments An energy assessment performed by an assessor to determine whether a customer is eligible for a particular program benefit. performed by an assessor to determine whether a customerCustomer A user of a program front-end portal generally receiving a benefit or service. is eligible for a particular program benefit.
Bar TabBar Tab Short for Bar Tabulation. From quora.com: a way to pay for your nights drinking all at once, instead of making individual transactions after each drink (or round of drinks)... Smaller towns where people all know each other have in the past, and might still continue to allow a Tab to be paid on pay day, or the end of the week.
Short for Bar Tabulation. From quora.com: a way to pay for your nights drinking all at once, instead of making individual transactions after each drink (or round of drinks)... Smaller towns where people all know each other have in the past, and might still continue to allow a Tab to be paid on pay day, or the end of the week.
Customer
A user of a program front-end portal generally receiving a benefit or service.
Customer NumberCustomer Number A unique identifier that streamlines the retrieval and organization of customer records, ensuring efficient and precise data management. There may only be one customer record per number and it is protected from editing.
A unique identifier that streamlines the retrieval and organization of customer records, ensuring efficient and precise data management. There may only be one customer record per number and it is protected from editing.
Explanation of BenefitsExplanation of Benefits An Explanation of Benefits (EOB) is a document from your insurance company that summarizes the costs of a medical treatment or other health care service and how the cost is split between you and your insurer.
An Explanation of Benefits (EOBExplanation of Benefits An Explanation of Benefits (EOB) is a document from your insurance company that summarizes the costs of a medical treatment or other health care service and how the cost is split between you and your insurer.) is a document from your insurance company that summarizes the costs of a medical treatment or other health care service and how the cost is split between you and your insurer.
Mandatory AuthenticationMandatory Authentication Users must prove who they are before they can access certain services or information. This often involves entering a username and password or using other methods such as multi-factor authentication. This security measure ensures only authorized people may access sensitive data or systems.
Users must prove who they are before they can access certain services or information. This often involves entering a username and password or using other methods such as multi-factor authentication. This security measure ensures only authorized people may access sensitive data or systems.
PIIPII Personally identifiable information (PII) is any data that can be used to identify, locate, or contact a person. This includes information that directly or indirectly links to a person, such as their name, address, email address, phone number, government-issued ID number, social security number (SSN), taxpayer identification number, or date of birth. Protect Customer PII where at all possible and only use approved methods to communicate PII.
Personally identifiable informationPII Personally identifiable information (PII) is any data that can be used to identify, locate, or contact a person. This includes information that directly or indirectly links to a person, such as their name, address, email address, phone number, government-issued ID number, social security number (SSN), taxpayer identification number, or date of birth. Protect Customer PII where at all possible and only use approved methods to communicate PII. (PII) is any data that can be used to identify, locate, or contact a person. This includes information that directly or indirectly links to a person, such as their name, address, email address, phone number, government-issued ID number, social security number (SSN), taxpayer identification number, or date of birth. Protect Customer PII where at all possible and only use approved methods to communicate PII.
PII SpillagePII Spillage When personal information, like customer or vendor name, address, or Social Security number, accidentally or intentionally gets shared with the wrong people or into the wrong physical or digital place. This may happen by sending an email to the wrong person, storing information on insecure servers or devices, or through hacking. When PII spillage occurs, it may lead to problems like identity theft or financial loss.
When personal information, like customer or vendor name, address, or Social Security number, accidentally or intentionally gets shared with the wrong people or into the wrong physical or digital place. This may happen by sending an email to the wrong person, storing information on insecure servers or devices, or through hacking. When PII spillage occurs, it may lead to problems like identity theft or financial loss.
Program
A set of coordinated activities, projects, or services for which this software facilitates customer and vendor account creation and maintenance, communication, product inventory, accounting, and payments.
Program MandateProgram Mandate The mission of the program whether to provide a product, service, or allocate funds to program participants.
The mission of the program whether to provide a product, service, or allocate funds to program participants.
Secure MessageSecure Message A confidential and encrypted system to exchange messages and attachments between Customers, Vendors, and system users.
A confidential and encrypted system to exchange messages and attachments between Customers, Vendors, and system users.
