3 Compliance Issues to Consider with Call & Screen Recording

3 Compliance Concerns for Call and Screen Recording

Although it seems fitting to record every call in its entirety in a contact center for quality control, sometimes it’s better to leave out sensitive pieces of information. To start with, if you are storing sensitive information that could possibly breech compliance authorities like HIPAA, you want to ensure your data doesn’t get hacked leaving patient data exposed and vulnerable. Here are three things to consider with data capturing:

  • Data that isn’t stored can’t be stolen: When taking information like a credit card number over the phone it’s better to prevent the recording of that portion of the call.

  • Consider the security of your contact center software: Being able to restrict access and utilize disk and network encryption assists in adding an additional layer of security required for PCI compliance.

  • Conduct user security audits: Utilize software to perform audits on your users to ensure they adhere to policies and procedures regularly as defined by PCI DSS Regulations.

If your current software vendor has not covered or brought these topics to your attention, they are long overdue for an evaluation and comparison to the leaders in this market. CXM Conform offers a solution which easily integrates with top phone system manufacturers, provides smart solutions to help you achieve PCI compliance, and is end-user friendly. Contact CXM today for more information on how to decrease compliance breeches within your business at www.cxmrecord.com.

If You Don't Record Sensitive Data It Can't Be Stolen

PCI Compliance.JPG

PCI compliance is a regulatory standard for any company taking payments from customers using credit or debit cards. It involves a plethora of rules and regulations. If a company takes a customer’s sensitive information and then it’s stolen, the business that captured the information could be subject to major fines. There are easy ways to accomplish compliance when recording calls or capturing screens. Here are four ways CXM provides solutions to customers to minimize the threat of a security breach:

  1. Restricted access to data
  2. Disk and network encryption
  3. User security and audits
  4. Credit card muting

If you can’t hear it or see it, it can’t be stolen! Being able to automatically triggers start and stop to effectively pause recording of screens and voice allows CXM’s customers to maintain PCI compliance. Ensuring sensitive data is not being stored also assists with adherence to regulations. If you are interested in learning more about how CXM helps customers easily accomplish PCI compliance reach out to us here!

Insights on Your Agents Desktops!

Insights on Your Agents Desktops

Measuring the interaction between your agent and their desktop is a missing link in ensuring great customer service. For years, performance management has been about average handle time, minimizing wrap times, and ensuring the agent is equipped to resolve the caller’s requests. Once the agent is on the call with the client; the phone system becomes a stopwatch and has very little other data to offer. The recorded call does not tell us how the agent is using the applications that help them serve the customer. Desktop analytics provides powerful insights that can dramatically change your contact center’s performance.

Here are five top insights:

  1. Cut and Paste – The classic example of improving agent process performance is to identify and automate cutting and pasting between applications. Cutting and pasting data is faster than typing it, but it is extremely inefficient and error prone. The agent is focused on finding the customer data on another screen and pasting it, instead of focusing on the customer. Typically this slows down the agent by about 10-15 seconds per transaction. With the agent performing over one hundred transactions a day, that adds up to 15 minutes of reduced handle time. In many contact centers that means being able to serve 3-4 more customers per agent per day.
  2. focused on finding the customer data on another screen and pasting it, instead of focusing on the customer. Typically this slows down the agent by about 10-15 seconds per transaction. With the agent performing over one hundred transactions a day, that adds up to 15 minutes of reduced handle time. In many contact centers that means being able to serve 3-4 more customers per agent per day.
  3. Login Time –If your agents login to multiple applications, they could be wasting hours a day logging in and logging out. Desktop analytics tools can measure the total time spent and track what applications are being used. The tool kits that come with desktop analytics can then provide ways to securely automate the login processes with a single login and login and reduce what can be a 20 minute process down to one login. The system can even navigate to, and open the screens the agents need and have them ready to focus on your customers. Multiply five minutes times four logins and logouts a day, and you have 40 minutes of paid work time recaptured per agent, per day.
  4. Agent Workflow – You have given the agents tools to complete the job, but they have to use them properly in order to be successful. Desktop analytics tools can validate programs are accessed in the right order to ensure an optimal customer experience. It can ensure process adherence by identifying if a step was missed. Like managing other parts of your contact center, transactions on the desktop follow a pattern. By identifying when that pattern is broken; you can pinpoint performance improvement opportunities.
  5. Desktop Management – Desktops in your contact center may have been purchased at different times. They may have different processors, operating systems, browsers, and software. Having out of date desktops can slow down your agent’s performance and contribute to a negative customer experience. Desktop analytics reports on the operating systems, memory, hard drive space, and overall performance of the desktops in use, allowing you to pinpoint under performing machines.
  6. Application Management – Desktop analytics tools can monitor which applications are being accessed and how long the agent is accessing that application. This allows management to identify authorized and unauthorized applications to ensure compliance with corporate standards. This also allows for identifying applications that are never used. In many cases, there are applications that are not used that take up memory on the machine. By sun setting the application, companies may also realize a cost savings by not paying license or maintenance fees for applications that are not in use.

Through measuring and tracking the applications on the agent’s desktop, powerful insight can be gained to help streamline operations and improve the performance of the agents. The best solutions do not just collect and report on the data. It is critical to be able to take action on the intelligence you have gathered. Instead of hiring custom programming services from all of your vendors, desktop analytics tools are complemented with powerful automation tool sets. In the same way these tools are able to gather information, they can securely automate the processes necessary to keep your agents focused on your customers. Once thought of as a luxury for the contact center, desktop analytics and automation tools have become a necessity that can quickly identify and eliminate waste due to inefficient technology and processes.