Quality And Data Security
While building the process, quality parameters and checks are established. A basic step in all voice interactions is to record all transactions with prospects/clients and get samples evaluated for various parameters by trained auditors.
For data work, a system of check and fool proofing is employed to minimize errors.
Information Security Process is a three tier process. (The individual requirements will vary with each client.)
1. Physical Security (Level 1)
2. People (Level 2)
3. Systems (Level 3)
We maintain paperless workstations with no access to printers or copying devices.
Adequate logs and audit trails are kept of transactions.
All conversations with prospects are recorded.
Sample transactions are listened to by Quality team (live and logs).
Adequate firewall protection and access controls are provided.
Adequate background and reference checks are conducted before allocating personnel to assignments.