Make Your Compliance List, and Check it Twice

By TechZone360 Special Guest
Jeff Stroum, SoundBite Communications
December 20, 2012

It’s that time of year again: the holidays are in full swing, and if you are like me, your life is full of lists: gift buying lists, food shopping lists, stocking stuffer lists and maybe even naughty or nice lists. Most of us spend hours scouring online, in stores, and on mobile devices to find the perfect gifts for family and friends.   Just as list making is part of the holiday gift process, compliance is always on top of the list for contact centers.

In a recent blog post, Tim Segall, SoundBite’s CTO, referenced that, “Compliance knowledge is not a burden, it’s a mandate.” Fortunately for contact center leaders, advanced compliance suites give the gift of compliance year-round, striking the perfect balance between compliance costs, operating efficiency and positive customer interactions. Just as you must shop to provide gifts for your family, the contact center manager must provide a technology with a level of flexibility and control concerning compliance. Not having an advanced compliance suite that can properly report on, define, automate and complete your dialer audit processes is like showing up to the party with no gifts! 

When making their wish lists – for gifts and contact center technology – everyone wants the hottest and newest items. Dialer technology, for example, must be adaptable in the face of the ever-changing regulatory landscape.  Here’s what’s at the top of a contact center leader’s list this holiday season:

Managing consumer opt-in for your mobile strategy.  As companies across many industries identify and contact mobile devices, they must evolve with the regulations. Consumer permission records must be tracked to honor opt-ins (and outs) and maintain TCPA compliance. Garnering opt-ins is critical to increase list penetration and drive contacts on your daily dialer campaigns. 

Keeping up with carrier deactivation. Every day more than 400,000 wireless numbers get temporarily suspended, deactivated, or transferred to another network. If you're not receiving this type of information, you increase the risk of using data that is out-of-date, and as a result, managing your opt-in database becomes near impossible.

Ensuring secure data transmission to the agent interface. While all data requires protection, many industries carry an additional layer of privacy requirements. Healthcare businesses that face HIPAA compliance can take advantage of agent scripting tools that allow for PHI data to be encrypted on the platform and viewable to their agents. Financial organizations can use this same functionality to mask personal and financial data, ensuring proper risk mitigation.

As you work on your compliance list, seek partners with their fingers on the pulse of your industry and engage in dialogue. Ensure they understand your challenges and have a track record of building year-round compliance tools that can evolve with you and the ever-changing regulations. Happy Holidays and stay on the ‘nice’ list for compliance. 




Edited by Brooke Neuman
SHARE THIS ARTICLE
Related Articles

Microsoft Research Project Allows for Inexpensive 3D Scanning from a Smartphone

By: Christopher Mohr    8/27/2015

It is now possible to perform 3D scanning from a smartphone, without additional hardware or an Internet connection, thanks to a new Microsoft Research…

Read More

Amazon's Scaled Back Consumer Device Efforts, Dash Button, and More

By: Paula Bernier    8/27/2015

Word is that Amazon is scaling way back on its consumer devices efforts, having let go of dozens of Lab126 engineers who worked on its Fire phone, acc…

Read More

The 4K War is Brewing, but Don't Expect a Crowned Winner

By: Special Guest    8/27/2015

The hype around 4K Ultra HD video is growing and we're seeing it gain traction in real ways. From the NFL Network and CBS using 4K cameras to capture …

Read More

Wallet Wars Part 2: Thanks to EMV, the Force is with Mobile Wallets

By: Special Guest    8/26/2015

In December 2015, when "Star Wars: The Force Awakens" hits movie theatres across the U.S., a very different type of force will 'awaken' the mobile wal…

Read More

Major Automakers Forge Alliance to Combat Cyberattackers

By: Joe Rizzo    8/25/2015

If you take a few minutes to think about what hackers go after, you'll realize that it is anything that has an Internet connection. Thanks to the Inte…

Read More