<p>Because TIM Enterprise (in conjunction with one or more <span class="reference">Magic Boxes</span>) records the call audio at strategic boundaries in your telecom infrastructure - usually your organisation's <b>telephone lines</b>, rather than each user's telephone <b>handset</b> - some reconciliation is normally required between those boundaries and the actual agent that handled the call.</p> <p>By default, this reconcilliation occurs automatically by TIM Enterprise, which is how the agent-centric calls that you see in call reports are able to be associated (matched) with each call as seen from the point of view of a telephone line, which delivers calls to many agents.</p> <p>During obfuscation, it is necessary that a user or device sends at least two signals to TIM Enterprise. Together, these two signals allow TIM Enterprise to mask out the audio between the two points in time that each signal was received.</p> <img class="screenshot" src="http://www.tri-line.com/common/img/documentation/tim_enterprise/obfuscation.png" alt="Obfuscation" /> <p>At the point in time during an agent's call when obfuscation is necessary - e.g. <i>"Can I have your CVV number please?"</i> is spoken by the agent, a signal is sent by the agent to TIM Enterprise, which records the event along with the exact time it was sent.</p> <p>Similarly, when the sensitive part of the call has completed, a further signal is sent by the agent to TIM Enterprise, which records that event too.</p> <p>A single telephone call can contain more than one obfuscation; the number of signals required is always exactly twice the amount of obfuscations in a call.</p> <h2>Assumptions</h2> <p>This guide assumes the following statements are true:-</p> <ul> <li>You have a licensed copy of TIM Enterprise that includes voice recording</li> <li>Your installation is at least version 3.0.0.55</li> <li>You have one or more <span class="reference">Magic Boxes</span> installed, each with their governing <span class="reference">RTA Service</span></li> </ul> <h2>Common solutions</h2> <p>Taking the example of masking out some digits of a phone call when a credit card number is being quoted, most solution providers modify the data entry system that an agent uses.</p> |