Risk Management privileges

This table details the privileges you can grant for Risk Management Component of the Real-Time Analytics (RTA) Framework that provides interaction search and replay functionality, combined with integration of the Real-Time Analytics (RTA) Framework..

Administrators configure role privileges by selecting User Management Module that an administrator uses to create a profile for each employee in their organization. from the main menu. Under Security, select Roles Setup. When editing or viewing roles, you can find privileges in the Risk Management category Grouping of calls in Speech Analytics that pertain to specific business issues among all transcribed interactions..

Privilege

Description

Default Role

View Risk Management

Search for Interactions Product that assists contact centers increase operational effectiveness and improves the customer experience through full-time recording, powerful quality monitoring, compliance/liability management, rich reports, and an intuitive, dashboard-style interface. in Risk Management:

Administrator

Trader

Risk Manager

Configure Biometrics

All features available to the View Risk Management privilege Permissions associated with each role that define the features of the application a user is able to view and the functionality in the application the user can access..

Administrator

Configure fields (CTI attributes used during identity verification Feature in voice biometrics where the speaker’s voice is compared to a collection of employee or customer voiceprints that should match the call. If a match occurs, the speaker is said to be verified. of employees and customers)

Configure employees, customers, and targets (manage voiceprint File containing a mathematical summary of the vocal patterns of a person’s voice used in the IAFD product to assist with identity verification and detection. models):

  • Create person (employee, customer, target) details

  • Manage voiceprint models, which includes the ability to:

    • Review voiceprint model training status

    • Review audio segments used by the model

    • Change the audio channel used for segments

    • Upload, add, and remove audio segments used to train models

      The ability to approve audio for voiceprint models is not granted. See the Approve/Unapprove Interactions for Enrollment privilege.

  • Opt out (exclude) employees and customers from voice biometrics

Configure watch list List that contains one of more voiceprints of people who are of particular interest to an enterprise.s for target detection Function of the IAFD product that compares a caller’s voice to one or more voiceprints in a watch list to detect if a target is participating in a call.:

  • Create and modify watch lists

  • Assign targets to watch lists

Approve/Unapprove Interactions for Enrollment

All features available to the Configure Biometrics privilege.

Administrator

 

Approve and unapprove audio used for voiceprint model training.

At least one user in the enterprise must be granted permission to approve and unapprove interactions used for enrollment Process in the IAFD product where an employee, customer, or target is registered and the system is then able to assist with identity verification and watch list detection when that speaker is on a call.. Otherwise, manual approval of interactions is not possible.

Publish Saved Searches

All features available to the View Risk Management privilege.

Administrator

Risk Manager

Manage public searches:

  • Publish private, saved searches to all users in the organization.

  • Create public, saved searches for all users in the organization.

  • Unpublish saved searches the user has published.

View Cases In Risk Management, use cases to group interactionss according to the needs of the enterprise. Interactions can reside in multiple cases simultaneously.

All features available to the View Risk Management privilege.

Administrator

Risk Manager

Manage assignment of interactions to cases:

  • Access cases

  • Assign interactions to cases

  • Copy interaction between cases

  • Remove interactions from cases not under legal hold

  • Move interactions from cases not under legal hold to another case

Edit Cases

All features available to the View Cases privilege, plus create private cases not under legal hold.

Administrator

Risk Manager

Delete Cases

All features available to the Edit Cases privilege, plus remove cases from the system.

To delete cases under legal hold, users must also have the Disable Legal Hold privilege.

Administrator

Delete Interactions using a Recycle Bin A recycle bin is a special type of case that serves as a temporary location for interactions scheduled for deletion based on a period of days, known as 'days until deletion.' After the number of days expire, the system permanently deletes the interactions.

All features available to the Edit Cases privilege, plus:

  • Add interactions to recycle bins

  • Create recycle bins

  • Change recycle bins

  • Delete recycle bins

Administrator

Disable Legal Hold

All features available to the Edit Cases privilege, plus remove legal hold from cases.

For users with the Delete Cases privilege, Disable Legal Hold also grants permission to delete cases under legal hold.

Administrator

Enable Legal Hold

All features available to the Edit Cases privilege, plus place cases under legal hold.

Administrator

Risk Manager

Remove Interactions from Legal Hold Case

All features available to the Edit Cases privilege, plus remove interactions from cases under legal hold.

Administrator

Risk Manager

Edit Metadata Targets

All features available to View Risk Management privilege.

Administrator

Risk Manager

Configure metadata definitions for Metadata Detection.

IMPORTANT: Metadata detection configuration requires additional role permission in User Management. In addition to Edit Metadata Targets, you must also have permission to View Analytics Rules (found in Enterprise Manager Configuration under Roles Setup).

Configure watch lists for Metadata Detection:

  • Create and modify watch lists

  • Assign metadata to watch lists

IMPORTANT: Watch list configuration requires additional role permission in User Management. In addition to Edit Metadata Targets, you must also have permission to View Analytics Rules (found under Enterprise Manager Configuration).

Introduction to Risk Management privileges

Pre-Defined Risk Management roles