Introduction to Risk Management privileges
Use roles and privileges to determine who can perform specific tasks related to Risk Management Component of the Real-Time Analytics (RTA) Framework that provides interaction search and replay functionality, combined with integration of the Real-Time Analytics (RTA) Framework..
Privilege type |
Description |
---|---|
Permission to access Risk Management is based on assigned privileges. Default roles with access to Risk Management include:
|
|
Feature privileges |
When performing tasks in Risk Management, the Interactions Product that assists contact centers increase operational effectiveness and improves the customer experience through full-time recording, powerful quality monitoring, compliance/liability management, rich reports, and an intuitive, dashboard-style interface. privileges for the role assigned to the user controls the ability of the user to access features. For example, you can grant separate privileges to:
Default roles with access to use Risk Management features include:
|
Interactions privileges |
Access to specific interactions is based on the organizations, groups, and subgroups over which you have scope (not including your own interactions). These scope-based permissions apply when you are searching for, replaying, and exporting interactions in Risk Management.
|
Case privileges |
The ability to view, edit, and delete cases is determined by the Risk Management privileges assigned to user roles. In addition, the ability to enable and disable the Legal Hold status of cases and to remove interactions from a case under legal hold is also determined by the Risk Management privileges assigned to user roles. Case visibility for specific organizations and groups is configured through the Assignment Manager Interactions application that allows administrators to define user access permissions and scope of the Interactions and Analytics applications.. |
The ability to create, update, and delete recycle bins is determined by the Risk Management privileges assigned to user roles. |
|
Folder privileges |
The Remove Contact Flags privilege controls the ability to create, update, and remove folders. Folder visibility for specific organizations and groups must also be configured through the Assignment Manager. |
Administration privileges |
Permission to perform administrative tasks related to Risk Management. For example, the assignment of roles and privileges The only default role with administration privileges is the Enterprise Manager Administrator. |