Svoboda | Graniru | BBC Russia | Golosameriki | Facebook

To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Information security has emerged as a significant concern for banks, mobile phone companies and other businesses that use call centers or business process outsourcing, or BPO. There have been instances of theft of personal data reported from call centers.

Britain's Financial Services Authority examined standards in India in April 2005 and the Banking Code Standards Board audited eight India-based call centers in 2006, handling more than a million calls per month from the UK. the examinations did not extend to Africa-based call centers staffed by workers of Indian origin.

The BCSB report stated that "Customer data is subject to the same level of security as in the UK. High risk and more complex processes are subject to higher levels of scrutiny than similar activities onshore."[1]

India's NASSCOM has said that they take breach in security extremely seriously and will assist the police in their probe.

Common countermeasures

There are three identifiable types of illicit activities concerning fraud emanating from call centers:

  1. Crooks who pretend to be legitimate call centres.
  2. Hackers who gain access to call centre information through illegal means
  3. Call centre agents who illegally misuse the information they have access to in call centres.
  4. 3rd and 4th party software implementation, allowing for "back-doors" to be entered remotely, sometimes under the "credentials" of security.

While items 1 and 2 are mostly subject to police action, call centres can use internal procedures to minimise risk. Such mitigation measures include but are not limited to:

  1. Creating a paperless environment, preventing employees from writing down and removing information by ensuring that all work processes are done on the computer, without having to record anything on forms or notes.
  2. Prohibiting the use of cellphones and cameras on the floor.
  3. Prohibiting paper, pens and digital recording devices from being brought onto the floor.
  4. Preventing internet access for employees on the floor.
  5. Limiting functionality and access of personal computers or terminals used by call center agents (for example, disabling USB ports). Companies may also use data loss prevention software to block attempts to download, copy, or transmit sensitive electronic data.[2]


Every call center is undoubtedly unique, as are organization’s requirements. But in nearly all cases, a biometric-based multi-modal platform solution for the call center can dramatically improve fraud prevention. By bringing seamless, multi-modal biometrics to your customers, agents and IVR, you prevent fraud losses, reduce your average handle times, contain more calls within IVR, and deliver markedly better customer experiences from any phone, anywhere.[3]

See also

References

  1. ^ Outsourcing thriving in Britain despite India bash
  2. ^ Call Center Security How: to Protect Employees and Customers
  3. ^ "4 Ways to Bring the Delight, Cost Efficiency, and Security of Online Experiences to Your Contact Center - Daon". daon.com. Retrieved 2020-09-08.

External links


This page was last edited on 26 January 2024, at 14:28
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.