<p>Because TIM Enterprise (in conjunction with one or more
<span class="reference">Magic Boxes</span>) records the call audio at strategic boundaries in your
telecom infrastructure - usually your organisation's <b>telephone
lines</b>, rather than each user's telephone
<b>handset</b> - some reconciliation is normally required
between those boundaries and the actual agent that handled the
call.</p>
<p>By default, this reconcilliation occurs automatically by TIM Enterprise, which is how the
agent-centric calls that you see in call reports are able to be
associated (matched) with each call as seen from the point of view of a
telephone line, which delivers calls to many agents.</p>
<p>During obfuscation, it is necessary that a user or device sends at least two
signals to TIM Enterprise. Together, these two signals allow
TIM Enterprise to mask out the audio between the two points in time that
each signal was received.</p>
<img class="screenshot" src="http://www.tri-line.com/common/img/documentation/tim_enterprise/obfuscation.png" alt="Obfuscation" />
<p>At the point in time during an agent's call when obfuscation is necessary -
e.g. <i>"Can I have your CVV number please?"</i> is spoken
by the agent, a signal is sent by the agent to TIM Enterprise, which
records the event along with the exact time it was sent.</p>
<p>Similarly, when the sensitive part of the call has completed, a further signal is
sent by the agent to TIM Enterprise, which records that event
too.</p>
<p>A single telephone call can contain more than one obfuscation; the number of signals required is
always exactly twice the amount of obfuscations in a call.</p>
<h2>Assumptions</h2>
<p>This guide assumes the following statements are true:-</p>
<ul>
<li>You have a licensed copy of TIM Enterprise that includes voice recording</li>
<li>Your installation is at least version 3.0.0.55</li>
<li>You have one or more <span class="reference">Magic Boxes</span> installed, each with their governing <span class="reference">RTA Service</span></li>
</ul>
<h2>Common solutions</h2>
<p>Taking the example of masking out some digits of a phone call when a credit
card number is being quoted, most solution providers modify the data
entry system that an agent uses.</p> |