From Bright Pattern Documentation
Contents
- Introduction
- General Information
- Contact Center Configuration Process
- Initial General Configuration
- Inbound Voice and Chat Service Configuration
- Outbound Campaign Configuration
- Email Service Configuration
- Users and Teams
- Overview
- Users
- Forwarding and Voicemail Operation
- Teams
- Agent Dashboard Metrics
- Roles
- Privileges
- Skill Levels
- Help Screens
- Directory
- Scenario Entries
- Scenarios
- Services and Campaigns
- Services and Campaigns Overview
- Properties Tab
- Assignments Tab
- Lists Tab
- Dispositions Tab
- Activity Tab
- Numbers Tab
- Service Level Tab
- Outbound Tab
- Results Tab
- Archive Tab
- Canned Tab
- Email Tab
- Pre-defined Dispositions
- Outbound - General
- Outbound - Calling Hours
- Outbound - Dial Rules
- Outbound - DNC
- Outbound - Diagnostics
- Activity Forms
- Lists
- Tasks
- Call Center Configuration
- General Settings
- Integration Accounts
- Knowledge Base
- Calendars
- Hours of Operation
- State Calling Hours
- Auxiliary Skills
- Audio Treatments
- Shared Voice Segments
- Voicemail
- Omni-Channel Routing
- Chat Settings
- Email Settings
- Quality Management
- Reporting
- Security
- Appendices
Contact Center Administrator Guide
Encryption
Recordings and transcripts of all your contact center interactions can be encrypted while they are stored in the Bright Pattern Contact Center system.
Before you can use the encryption capability, it must be enabled for your contact center at the service provider level.
To enable encryption, go to Security > Encryption Settings and check the items that you intend to store encrypted.
Select from the following:
- Encrypt chat transcripts
- Encrypt SMS/MMS transcripts
- Encrypt stored email messages and attachments
- Encrypt screen recordings
Note that encryption of call recordings is configured for each service separately.
When you export any encrypted items out of the system, they will be unencrypted for export.
For more information about the method and keys used for encryption, see section Encryption Key Management.