Are you aware of which of your clients may be experiencing any form of vulnerability? If so, are they being identified on your client database and are they being handled with the sensitivity and flexibility required?
Identifying and logging your vulnerable clients
