Turning TCPA Lemons into Enterprise Lemonade. Exelon and Neustar Discuss TCPA and Enterprise Phone Management for Utilities
|
|
- Tobias Baldwin
- 5 years ago
- Views:
Transcription
1 Turning TCPA Lemons into Enterprise Lemonade Exelon and Neustar Discuss TCPA and Enterprise Phone Management for Utilities
2 Presenters Mitchell Young Neustar Exec. Director, Identity Solutions Kindle Cook Exelon Senior Project Manager Neustar Inc. All Rights Reserved 2
3 AGENDA Industry Insights & Neustar Background Customer Phone Numbers & Impact to Utilities TCPA & Outbound Communications Background on TCPA Knowing Your Customer s Identity Exelon TCPA Project 2018 Neustar Inc. All Rights Reserved 3
4 LEGAL DISCLAIMER The information in this presentation was compiled for informational purposes only. No information contained herein is intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing your own programs and policies. We do not guarantee the accuracy of this information or any results. 4
5 Industry Insights & Neustar Background Why Accurate Customer Phone Numbers Are More Important Than Ever 2018 Neustar Inc. All Rights Reserved 5
6 TCPA LAWSUITS Are You Prepared? Largest Lawsuit (by year) 2017: $280M CSP 2016: $76M Travel 2015: $60M Financial Services 2014: $75M Financial Services 2013: $35-$47M Quick Service Restaurant 2.6K K K K Neustar Inc. All Rights Reserved 6
7 CONSUMER DATA IS CONSTANTLY CHANGING Every Year 45M Consumers change their phone numbers 60M People relocate 2018 Neustar Inc. All Rights Reserved 7
8 For over 20 years, a leader in the telecommunications industry: Power 90% of U.S. Caller ID Manage U.S. Directory Assistance N. American Numbering Plan Administrator TCPA Advisor to the FCC 2018 Neustar Inc. All Rights Reserved 8
9 A leader in phone identity management: 10 of Top 10 U.S. Banks Top 3 U.S. Cable TV Providers 8 of Top 10 Insurance Companies 7 of Top 15 Utilities 50% of U.S. Online Retailers Verify Consumer Identity 1.4 Billion Time Each Day 2018 Neustar Inc. All Rights Reserved 9
10 Consumer Phone Numbers & Its Impact on Utilities 2018 Neustar Inc. All Rights Reserved 10
11 PROACTIVELY KEEP CRM DATA ACCURATE & UP-TO-DATE ORIGINAL CRM NEUSTAR CLEANSE/APPEND John Smithe Misspelled Name 19 National Drive McLean, VA Non-Standardized Address Unknown Phone Type Unverified John Smithe Inexact Last Name Match Corrected Name Available 19 National Drive McLean, VA Standardized and Verified: Address belongs to John Smith Type = Wireless Mismatch: Phone does not belong to John Smith Wireless Phone Linked to John Smith. Active Phone. Available. jsmith@gmail.com Verified: Belongs to John Smith john.smith@work.com Additional Available CONTINUOUSLY CORROBORATED 11
12 Neustar Customer Identity Management Account Origination! Emergency Notifications $ Collections Marketing General Notifications Inbound Communications 2017 Neustar Inc. All Rights Reserved
13 Identity Management: Outbound Communications Ensure customers receive messages Improve customer experience Reduce TCPA risk Reduces inbound calls! Emergency Notifications $ Collections General Notifications 2017 Neustar Inc. All Rights Reserved
14 Identity Management: Inbound Communications Increase customer identification Improve customer experience Reduce live agent costs Increase IVR containment rates Inbound Communications 2017 Neustar Inc. All Rights Reserved
15 YOU SPEND BILLIONS TO BE CUSTOMER-CENTRIC $558B Fortune 500 estimated spend on customer experience But who are you really interacting with? Source: Gartner, Fortune 2018 Neustar Inc. All Rights Reserved 15
16 Utilities and The Telephone Consumer Protection Act (TCPA) 2018 Neustar Inc. All Rights Reserved 16
17 FCC 2015 DECLARATORY RULING ON TCPA Two Key Issues for Utilities 1. Definition of Called Party Consent not valid if phone reassigned ( Intended recipient irrelevant) 2. Consent/Revocation of Consent A consumer may revoke consent at any time, through any reasonable means EEI/AGA Petition clarified prior express consent provided at sign-up
18 CONSENT REQUIREMENTS FOR AUTO-DIALING OR TEXT MESSAGING Types of Notifications Examples Consent Required Emergency Notifications Scope is unclear Exempt Informational Notifications Service Outages Meter Work; Field Work Pending Curtailment Subsidized Service Brownouts Prior Express Consent Satisfied if Customer Provides Phone # Telemarketing Messages New Services Scope is unclear Prior Express Written Consent Risk lies in Auto-Dialing a Reassigned Cell Phone 2018 Neustar Inc. All Rights Reserved 18
19 Outbound Customer Communications Knowing Your Customers Identity 2018 Neustar Inc. All Rights Reserved 19
20 PHONE QUALITY: UTILITY INDUSTRY BENCHMARK PHONES 18%-22% Phones Wrong or Disconnected Customers Not Receiving Messages/Alerts Significant TCPA Risk 5% 7% 7% 11% Definition VERIFIED PHONE UNKNOWN 70% BUSINESS PHONE DISCONNECTED WRONG CONSUMER
21 NEUSTAR VERIFICATION FOR TCPA VERIFIED John Smith /1/2015 Name-to-Phone: Verified Phone Type: Mobile Phone In-Service: 12 Months + Disconnected: No 2018 Neustar Inc. All Rights Reserved 21
22 CASE STUDY: RECEIVED COMMUNICATION REDUCES DISCONNECT RATES Challenge: Customers 44% more likely to have service disconnected if they don t receive Disconnect for Non-Payment Call. Solution Neustar Phone Verification and Proactive Change Results $1.6M in wasted truck roll costs identified Improved customer experience Reduced bad debt 2018 Neustar Inc. All Rights Reserved 22
23 CASE STUDY: RECEIVED COMMUNICATION REDUCES INBOUND CALLS Challenge: Customers call-in when they don t receive important outage communications due to wrong numbers. Our Solution Neustar Phone Verification and Proactive Change The Results 5% increase in customer satisfaction scores 7% less inbound calls $1M+ in annual cost savings Less risk to customer health and safety 2018 Neustar Inc. All Rights Reserved 23
24 INBOUND COMMUNICATIONS: AUGMENTING A CRM Utility Customer CRM ANI NOT FOUND Query Neustar 2018 Neustar Inc. All Rights Reserved 24
25 INBOUND COMMUNICATIONS: AUGMENTING A CRM NEUSTAR ACCOUNTLINK NEUSTAR REPOSITORY (Mobile) Utility Customer CRM IMPACT 76% increase in ANI to ANI match 26% increase in IVR containment Reduce live agent costs + improve customer experience Patrick Smith 32 Schindler Place New Brunswick, NJ patrick.smith@verizon.net (Landline) (Mobile) Also in Household: Camille Smith camsmith13@verizon.net Lauren Smith laurensmith@hotmail.com MATCH FOUND: Patrick Smith Camille Smith 32 Schindler Place New Brunswick, NJ Phone: Status: Active Account: Balance: $ Neustar Inc. All Rights Reserved 25
26 The Implementation of a TCPA Solution at Exelon Utilities May 2018 Kindle Cook - Sr. Project Manager
27 Exelon TCPA Project Steps Project goals 2. Developing project team 3. Completing phone scrub of the Customer CRM early 4. Creating inventory of automated calls 5. Determining process for opt-out/wrong number requests
28 1. Project Goals 28 Designed to mitigate risks associated with 7 million customers Over 100 programs that contact customers Millions of customer calls a month Two key issues 1. Wrong/Recycled Phone Numbers Initial and ongoing scrub of phone numbers is important to ensure customer information doesn t contain wrong/recycled phone numbers 2. Consent & Opt-Outs Ensure customer has a reasonable way to revoke consent Technically, be able to track and implement revocations
29 2. Project Team & Legal Sponsorship 29 Exelon Project Team members from each operating company ComEd PECO BGE
30 3. Phone Number Scrub Early & Ongoing 30 Neustar verified if customer still owned phone number Create baseline of consent and phone ownership Wrong/Recycled numbers identified Replace wrong/recycled phone numbers with or blank Impacts of removing wrong numbers Consider regulatory requirements to contact customer not by phone Costs associated with contacting customer to get a new phone number
31 4. Inventory of Customer Calling Programs 31 Outbound calling programs divided into 3 groups: 1. Informational Customer can opt out 2. Marketing Customer can opt out 3. Emergency Customer cannot opt out Note: Regardless of category, all text messages are opt in only Get Legal sign-off on classification
32 4. Inventory of Customer Calling Programs 32 Capture details of Calling Programs Description of activity If made by vendor, vendor s name Call or Text Type of integration Volume estimates for all calling programs Business ownership o Credit and Collections o Marketing o Field o o o Employee Government/External Storm
33 5. Opt-Out & Wrong Number Requests: Landline vs Mobile 33 Landline and mobile phone numbers identified to meet requirements Opt-Out option for following calls: 1. Landline numbers for marketing purposes 2. Mobile numbers for all purposes (except emergency) Wrong Number reporting option offered on all calls -- Emergency, Informational, and Marketing -- for 1. Landline numbers 2. Mobile numbers
34 5. Opt-Out & Wrong Number Request Options & Policies 34 Customer options for updating notification preferences Call the Call Center to inform a live agent Press 9 during an automated call Reply STOP to a TEXT message Press 7 to indicate a wrong number during an automated call Online preference center Live agent must process Opt-Out or Wrong Number, but DOES NOT need to proactively ask Express consent can be collected during customer sign up or during updates to contact information
35 5. Managing an Opt-Out 35 When consent revoked, non-emergency calls/texts stopped Once you opt out of one program, you opt out of all Bill insert used to inform customer of Opt-Out impact Directions on how to opt back in Consent must be re-established before number is used again
36 Final Thoughts & Considerations 36 Maintain within customer system: TCPA opt out list Landline or Mobile Phone indicator If all vendors placing calls/texts don t go live at same time, may want to address risk during the phase-in period Develop a process to add new calling programs or vendors post-project
37 KEYS TO TCPA Capture and maintain proper consent Understand the type of phone you are calling Confirm phone still belongs to intended call or text target 2018 Neustar Inc. All Rights Reserved 37
38 Questions? Mitchell Young Neustar Exec. Director, Identity Solutions Kindle Cook Exelon Senior Project Manager Neustar Inc. All Rights Reserved 38
TCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA
TCPA Features Guide West Corporation 100 Enterprise Way, Suite A-300 Scotts Valley, CA 95066 888-527-5225 www.schoolmessenger.com Table of Contents Introduction... 3 The Telephone Consumer Protection Act
More informationAddressing the FCC s TCPA Declaratory Ruling and Order
Addressing the FCC s TCPA Declaratory Ruling and Order Addressing the FCC s TCPA Declaratory Ruling and Order Table of Contents Background 2 Key Items of the Declaratory Ruling and Order 3 Definition of
More informationTCPA Mission Creep. 5 Things You Need to Know to Avoid Litigation Under the FCC s New TCPA Ruling
TCPA Mission Creep 5 Things You Need to Know to Avoid Litigation Under the FCC s New TCPA Ruling Roadmap I. Background II. TCPA Prohibitions III. Recent FCC Ruling IV. Challenges V. Guidance 2 47 U.S.C.
More information2018 TCPA Texting Rules Every Car Dealership Needs to Know.
2018 TCPA Texting Rules Every Car Dealership Needs to Know. advantage txt. Providing your customers the communication options they demand. Today s reality regarding real time communication is proven in
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Rules and Regulations Implementing the ) CG Docket No. 18-152 Telephone Consumer Protection Act of 1991 ) CG Docket
More informationCOST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process
COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems
More informationInteractive Mobile Messaging
Using Text Messaging to Increase Response Rates December 15, 2010 Agenda Industry Trends and Consumer Expectations SoundBite Introduction Interactive Mobile Messaging Case Studies Question and Answer 2
More informationDefinition of an Automatic Telephone Dialing System. Legal Update July 23, 2015
Legal Update July 23, 2015 US Federal Communications Commission s Recent Order Expands Potential Liability under the Telephone Consumer Protection Act for Business-to-Customer Calls and Text Messages This
More informationTCPA Compliance. Best Practices for Two-Way Texting
TCPA Compliance Best Practices for Two-Way Texting When selecting a business-texting solution, companies must consider the potential for legal exposure under the Telephone Consumer Protection Act of 1991
More informationReady, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan
Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals
More informationLegal Aspects of Cybersecurity
Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data
More informationPUBLIC NOTICE FCC ENFORCEMENT ADVISORY TELEPHONE CONSUMER PROTECTION ACT ROBOCALL AND TEXT RULES
PUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 DA 16-264 March 14, 2016
More informationTCPA Best Practices & Risk Reduction
TCPA Best Practices & Risk Reduction The Five Stages of Grief Bob Davis bob@davisresearch.com Five Stages of Grief Denial Anger Bargaining Depression Acceptance Disclaimer I am not a lawyer and I am not
More informationBack to the Future with Pay-Per-Call Marketing. Daryl Colwell Senior Vice
Back to the Future with Pay-Per-Call Marketing Daryl Colwell Senior Vice President dcolwell@fluentco.com @dhcolwell About Us Fluent, LLC Industry leader in peoplebased digital marketing and customer acquisition
More informationService Delivery Platform
Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations
More informationCebod Telecom. Customer Admin Manual
Customer Admin Manual Table of Contents Contents 1. INTRODUCTION... 1 ABOUT THIS MANUAL... 1 CEBOD TELECOM OVERVIEW... 1 2. REGISTER A NEW ACCOUNT... 2 3. MY ACCOUNT... 5 4. DASHBOARD... 9 5. ACTIVITIES...
More informationBefore You Hit Send: How Canada s New Anti-Spam Law Will Affect You
Before You Hit Send: How Canada s New Anti-Spam Law Will Affect You International Association of Business Communicators June 17, 2014 Adrian Liu Lawyer (416) 367-6585 aliu@blg.com Outline Canada s New
More informationCustomer Proprietary Network Information
Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information
More informationContact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center.
Contact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center. Outbound Prerecorded Messages Mitchell N. Roth, Esq. Partner, Business and Communications Practices
More informationRETIREMENT ACCOUNT APPLICATION FORM. Share Dealing
RETIREMENT ACCOUNT APPLICATION FORM Share Dealing Please fully complete this form if you wish to set up a Share Dealing account for a Scottish Widows Retirement Account. Please note that the purchase of
More informationNetwork & Infrastructure Management (NIM) with Riverbed SteelCentral
Solution Brief Network & Infrastructure Management (NIM) with Riverbed SteelCentral Companies leverage far too many tools to manage the performance of their networks and infrastructure. The result of a
More informationOverview Bank IT examination perspective Background information Elements of a sound plan Customer notifications
Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information
More informationGeneral Data Protection Regulation (GDPR)
BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017
More informationAccess to University Data Policy
UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationCentral Maine Power AMI Program: Building a Stronger, Smarter Grid for Maine Contact: Laney Brown;
Central Maine Power AMI Program: Building a Stronger, Smarter Grid for Maine Contact: Laney Brown; laney.brown@cmpco.com October 10, 2012 1 Overview of Central Maine Power Wholly-owned subsidiary of Iberdrola
More information7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager
7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look
More informationRISK MANAGEMENT Education and Certification
RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities
More informationThe US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by
The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual
More informationAMI Overview Don Perio Manager - Meter Reading & Operations Entergy Louisiana, USA. Metering, Billing/CIS America 2008, San Diego, CA
AMI Overview Don Perio Manager - Meter Reading & Operations Entergy Louisiana, USA 1 Outline Who is Entergy? Why AMI? AMI Pilot Development & Process AMI Technology Selection Network Overview Demand Response
More informationBob Gnapp Director Member Training & Network Analysis
Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation
More informationNetworking Strategy and Optimization Services (NSOS) 2010 IBM Corporation
Networking Strategy and Optimization Services (NSOS) Agenda Network Strategy and Optimization Services (NSOS) Overview IBM NSOS NAO Offerings Model IBM NSOS NIO Offerings Model Why IBM Lot of specialist
More informationTake a Confident Step towards Migration to Microsoft Skype for Business
Migration Service for Microsoft Skype for Business Take a Confident Step towards Migration to Microsoft Skype for Business Know Your Unified Communications Environment before and after Migration Microsoft
More informationRethinking Your Approach to Paperless
Rethinking Your Approach to Paperless For 7 Reasons to Add Email to Your Multi-channel Offering Matt Swain Director April 1, 2015 2015 InfoTrends Industry analyst firm focused on the digital imaging, marketing,
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationT3main. Powering comprehensive unified communications solutions.
T3main Powering comprehensive unified communications solutions. MANAGE COMMUNICATIONS THE SMART WAY T3 Telecom Software designs innovative voice messaging, unified messaging and call routing environments
More informationFrequently Asked Questions. About The Do Not Contact Rules
Updated as of March 2015 Frequently Asked Questions About The Do Not Contact Rules These Frequently Asked Questions should be read in conjunction with NRT s Do Not Contact Policy and will be updated from
More informationVerizon Wireless Ranks Highest in Wireless Network Quality Performance in Five Regions; U.S. Cellular Ranks Highest in One Region
J.D. Power and Associates Reports: Wireless Customers Using 4G LTE Technology-Enabled Devices Experience Fewer Problems Than Those Using 3G and Other 4G-Enabled Devices Verizon Wireless Ranks Highest in
More informationHome Phone Service CUSTOMER AGREEMENT
Home Phone Service CUSTOMER AGREEMENT This Agreement constitutes the agreement ("Agreement") between Public Service Data Wireless ("we," "us" or "PSDW") and the user ("you," "user" or "Customer") of Public
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationContact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center.
Contact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center. Welcome Mitch Roth Business to Business Compliance Protocols ATA General Counsel Partner Williams
More informationCLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls
CLIENT MEMORANDUM From: West Corporation Re: New Federal Trade Commission Rule for Prerecorded Message Telemarketing Calls Existing Federal Communication Commission Rule for Prerecorded Message Calls to
More informationExede Voice Desk Reference
Summary This Desk Reference covers: What is Exede Voice? Pricing Customer Commitment Where is Exede Voice Available? How do I sell Exede Voice? How do I Market Exede Voice? What Should My Customer Expect?
More informationProcessing Payments Securely in the Digital World
Processing Payments Securely in the Digital World Frank J. Leone, SVP, CTP Treasury Management Capital One Bank Mark Kemen Senior Business Analyst & Project Manager Cincinnati Bell William Cohn Head of
More informationJ.D. Power and Associates Reports: Rising Network Quality Issues Prompt a Higher Number of Calls among Wireless Business Customers To Report Problems
J.D. Power and Associates Reports: Rising Network Quality Issues Prompt a Higher Number of Calls among Wireless Business Customers To Report Problems Verizon Wireless Ranks Highest in Both Business Customer
More informationCardholder Fraud Alerts Frequently Asked Questions
Cardholder Fraud Alerts Frequently Asked Questions Get answers to your questions and learn the ins and outs of cardholder fraud alerts. 1. What are cardholder fraud alerts Cardholder fraud alerts are one
More informationMeasuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data
Measuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data Executive Summary Successful crisis management depends on an organization s ability to manage
More informationIt s a Smart Phone World
It s a Smart Phone World Like most of us, you probably own and extensively use a smart phone. It is the access point that manages your calls, texts, email, business and social world. You take it everywhere
More informationPermission At A Glance: DMA s Consumer Preferences & Choice Guidance
Permission At A Glance: DMA s Consumer Preferences & Choice Guidance *Please note: this document is not intended to provide you with specific legal advice. You should ensure you review your compliance
More information5LINX ID GUARD Product Overview. Credit/Presenter Goes Here
5LINX ID GUARD Product Overview Credit/Presenter Goes Here Statistics According to the FTC approximately 11 million people were victims of identity theft in 2009. It s estimated that $221 billion a year
More informationThe Revenue Mindset Shift Addressing false positives. Sam Hartung Whitepages Pro, Partnership Risk Manager
The Revenue Mindset Shift Addressing false positives Sam Hartung Whitepages Pro, Partnership Risk Manager The consumer expectation shift Convenience Curated shopping experience Speed Digital world with
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationUnderstanding Managed Services
Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean
More informationAnticipating the wider business impact of a cyber breach in the health care industry
Anticipating the wider business impact of a cyber breach in the health care industry John Gelinne, Director Cyber Risk Services Deloitte & Touche LLP jgelinne@deloitte.com commodore_22 Hector Calzada,
More informationMultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions
CASE STUDY MultiPlan Selects CyrusOne for Exceptional Scalable, secure and reliable data center solution keeps healthcare company operating seamlessly MultiPlan Inc., the industry s most comprehensive
More informationMobility best practice. Tiered Access at Google
Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more
More informationACCESS MCLE Privacy Laws Applicable To Wireless Marketing
ACCESS MCLE Privacy Laws Applicable To Wireless Marketing William B. Baker (202) 719-7255 wbaker@potomaclaw.com DISCLAIMER These materials and accompanying Access MCLE, LLC audio CLE program are for instructional
More informationFlorida Power & Light Customer Service Update
INVESTOR CONFERENCE 2010 BUILDING THE NEXT ERA OF CLEAN ENERGY Florida Power & Light Customer Service Update Marlene Santos Vice President of Customer Service May 3, 2010 Cautionary Statements And Risk
More informationSales and Marketing Strategies That Work for Financial Services
March 2008 Sales and Marketing Strategies That Work for Financial Services Julio Gomez Research Vice President www.financial-insights.com Agenda! Introduction to Financial Insights! Elements of a Winning
More informationBest Practices in Customer Callback Strategy Design and Implementation
Best Practices in Customer Callback Strategy Design and Implementation Todd Marthaler Contact Center Consultant Interactive Intelligence, Inc. Contents What is a callback?... 3 How does the Interactive
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationBe Prepared For Emergencies
Be Prepared For Emergencies You re never ready for a crisis, but you can be prepared. Emergency Checklist Inside G16205-C (03/16) Are you and your family prepared in the event of an unforeseen situation?
More informationJ.D. Power and Associates Reports: Social Networking and Gaming Applications Driving Smartphone Usage and Revenue
J.D. Power and Associates Reports: Social Networking and Gaming Applications Driving Smartphone Usage and Revenue Apple Ranks Highest in Customer Satisfaction among Smartphone Manufacturers, While LG Ranks
More informationKeeping It Under Wraps: Personally Identifiable Information (PII)
Keeping It Under Wraps: Personally Identifiable Information (PII) Will Robinson Assistant Vice President Information Security Officer & Data Privacy Officer Federal Reserve Bank of Richmond March 14, 2018
More informationTable of Contents. PCI Information Security Policy
PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology
More informationDate of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
More informationElements of a Swift (and Effective) Response to a HIPAA Security Breach
Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information
More informationGDPR is coming in less than 2 months Are you ready?
GDPR is coming in less than 2 months Are you ready? Charles-Albert Helleputte Partner, Brussels +32 2 551 5982 chelleputte@mayerbrown.com 30 March 2018 2 GDPR is everywhere... You were invited by UNICEO
More informationBusiness Continuity - An Inside Perspective
Business Continuity - An Inside Perspective Tom McIlvaine Business Continuity Manager May 24, 2011 Agenda Where It All Begins Private Sector & Government Applicability Business Continuity Planning A Corporate
More informationNEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE
COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:
More informationDon t let the new prepaid card rules be a surprise
Don t let the new prepaid card rules be a surprise Introducing: Rod Everson Experian Contents 1. Prepaid card market 2. The new prepaid rule 3. Customer Identification Program (CIP), Bank Secrecy Act and
More informationCYBER SECURITY AND MITIGATING RISKS
CYBER SECURITY AND MITIGATING RISKS 01 WHO Tom Stewart Associate Director Technology Consulting Chicago Technical Security Leader Protiviti Slides PRESENTATION AGENDA 3 START HACKING DEFINITION BRIEF HISTORY
More informationSample Proposal for Phase I of the Cisco Developer Contest
Sample Proposal for Phase I of the Cisco Developer Contest Important: 1. If the Terms and Conditions of the Cisco Developer Contest are not expressly accepted during registration, your proposal will not
More information5 Good Reasons. Your Software Platform Can t Ignore Text Messaging
5 Good Reasons Your Software Platform Can t Ignore Text Messaging If you ve got a CRM, lead generation or customer experience software platform of any kind, the concept of omni-channel communication is
More informationIncident Response Table Tops
Incident Response Table Tops Agenda Introductions SecureState overview Need for improved incident response capability https://pollev.com/securestate Overview of the exercise: Sample incident response table
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationCreating an IVR Script for Abandoned Calls
Cloud Contact Center Software Creating an IVR Script for Abandoned Calls Administrator s Guide June 2014 This document describes how to configure a script that plays an message to customers who were not
More informationSprint Security Support Services for Schedule No. 11*
Sprint Security Support Services are designed to minimize the vulnerability of Sprint's voice services customers to certain outbound international and inbound domestic toll free communications fraud originating
More informationWE SEE YOUR VOICE. SecureLogix We See Your Voice
ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and
More informationGo Time for Mobile Wallets?
Go Time for Mobile Wallets? Introduction Despite a clear desire for the ability to make payments without carrying a conventional wallet, for half of all consumers the concept of a mobile wallet remains
More informationNuance Loop Voice & Data Credit
Nuance Loop Voice & Data Credit 2018 Nuance Communications, Inc. All rights reserved 2 Nuance Loop - delivering increased revenue and ARPU for mobile operators Mobile operators face increasing pressure
More informationCASL Canada s Anti-Spam Legislation. In force - 1 July 2014
CASL Canada s Anti-Spam Legislation In force - 1 July 2014 2014 1 Disclaimer The information included in this presentation may not reflect the views of Industry Canada, or the Canadian Radio-television
More informationSMS/Text Messaging and TCPA Compliance
TM SMS/Text Messaging and TCPA Compliance Legal Disclaimer: The article is for informational purposes only and does not provide legal advice. Materials on this website are published by Alive5 to provide
More informationWorst-Case Scenarios. Your Hosted VoIP Provider Should Be Ready For. Brought to you by
5 Worst-Case Scenarios Your Hosted VoIP Provider Should Be Ready For Brought to you by CONTENTS Intro Disaster Recovery in the Cloud 1. In an Emergency, Can I Still Dial 911? 2. If My Internet Service
More informationJ.D. Power and Associates Reports: Overall Wireless Network Problem Rates Differ Considerably Based on Type of Usage Activity
Reports: Overall Wireless Network Problem Rates Differ Considerably Based on Type of Usage Activity Ranks Highest in Wireless Network Quality Performance in Five Regions WESTLAKE VILLAGE, Calif.: 25 August
More informationCisco Unified Contact Center Express Historical Reporting Guide, Release 10.6(1)
Cisco Unified Contact Center Express Historical Reporting Guide, Release 10.6(1) First Published: December 15, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
More informationMitel Phone Manager Outbound Quick Start Guide DECEMBER 2017 DOCUMENT RELEASE 5.1 QUICK START GUIDE
Mitel Phone Manager Outbound Quick Start Guide DECEMBER 2017 DOCUMENT RELEASE 5.1 QUICK START GUIDE NOTICE The information contained in this document is believed to be accurate in all respects but is not
More informationDisaster Recovery Planning
Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28, 2014 Our Technology Comes with People 1 Todays Objectives: Introduction to LUMOS Networks Get you thinking about your
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationIf you need help with Skype Connect, you can find more answers in our Skype Connect FAQs section: support.skype.com/category/skype_connect
About this guide Skype Connect provides connectivity between your business and the Skype community. By adding Skype Connect to your existing SIP-enabled PBX, your business could save on your communication
More informationREQUESTING EMERGENCY SERVICES. MDS AMIBA TERMS OF SERVICE Welcome to MDS AMIBA Broadband Phone Service. THESE TERMS AND CONDITIONS STATE IMPORTANT
REQUESTING EMERGENCY SERVICES. MDS AMIBA TERMS OF SERVICE Welcome to MDS AMIBA Broadband Phone Service. THESE TERMS AND CONDITIONS STATE IMPORTANT REQUIREMENTS REGARDING YOUR USE OF MDS AMIBA BROADBAND
More informationPrivacy Breach Policy
1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure
More informationNew SIP Trunking Admin Portal User Guide
New SIP Trunking Admin Portal User Guide Contents Welcome... 3 Viewing Your Locations... 4 Viewing location general information... 6 Viewing and editing location Caller ID... 7 Viewing and editing location
More informationIBM Resilient Incident Response Platform On Cloud
Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationBest Practices & Lesson Learned from 100+ ITGRC Implementations
Best Practices & Lesson Learned from 100+ ITGRC Implementations Presenter: Vivek Shivananda CEO of Rsam Dec 3, 2010 ISACA -NY Chapter Copyright 2002 2010 Relational Security Corp. (dba Rsam) Agenda Overview
More informationCardholder Alerts Frequently Asked Questions
Cardholder Alerts Frequently Asked Questions Get answers to your questions and learn the ins and outs of cardholder alerts. Table of Contents General Information...1 3 Cardholder Information...4 5 General
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationGSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014
GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 1 About GSX Solutions! Founded 1996, Headquartered in Switzerland! Offices in USA, UK, France, Switzerland, China! Indirect
More information