Browse Definitions :
Definition

e-score

The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts. E-score algorithms factor in variables such as salary, occupation, home value, debt load and shopping history, and assign a numerical score. 

E-scores are often used to evaluate an appropriate level of marketing and the types of offerings that are likely to be successful with a given consumer. Perhaps even more importantly, e-scores can indicate which consumers are unlikely to be profitable, so marketing resources will not be wasted. However, the e-score has no bearing on an individual's credit rating and cannot be taken into account for financial dealings such as loan applications. 

A number of companies provide consumer e-scores to other businesses. eBureau, a St. Cloud, Minnesota-based company, provides a service that they call eScore. Here's how the eBureau service works: A customer, such as a credit card company, provides eBureau with a list of leads (names of potential customers) and a list of existing customers that were first identified as leads. EBureau associates the names with relevant details and the software adds additional data associated with those details. The data from potential customers are compared with data from existing customers to determine the e-scores for individuals on the list of leads. Based on those e-scores, the credit card company can decide what type of card to offer to each individual and determine which individuals are not good prospects.

E-score information is not made available to consumers. 

This was last updated in September 2012

Continue Reading About e-score

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any ...

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close