Skip to main content
Skip table of contents

MiFID II Compliance

Additional manual configuration is required.

This page describes the Markets in Financial Instruments Directive (MiFID) II and the relevant features within Eleveo products. It is divided as follows:

CONTENTS

What Is the 'Markets In Financial Instruments Directive - MiFID'  and 'MiFID II'?

The Markets in Financial Instruments Directive (MiFID) is a European Union law that standardizes regulation for investment services across all member states of the European Economic Area. MiFID II is a legislative framework instituted by the European Union to regulate financial markets in the bloc and improve protections for investors with the aim of restoring confidence in the industry after the financial crisis exposed weaknesses in the system.

The Directive mainly impacts upon the procedures which employees must follow with regards to customer interactions, call recording, digital communications and record keeping. In the Directive customer interaction records are covered primarily in Articles 16 and 69.

Eleveo Supports Full Compliance With the MIFID II Regulation

Eleveo supports the core MiFID II requirements:

  • Capturing Relevant Interactions
  • Identifying - Tagging Relevant Interactions
  • Keeping Relevant Interactions
  • Auditing Data Flow and Data Access
  • Access Audit Logs and Media Files
  • Complaints Management
  • Complaints Training
  • Monitoring Complaints Conformity

MiFID II Compliance Features

Eleveo provides full compliance with the following relevant MIFID II objectives:

Control Objective

MIFID II Requirements

V 9.x

Capturing Relevant Interactions

1. Capturing any information provided to clients in telephone calls. > Powerful Recording Rules

2. Capturing any information provided to clients using another digital form of communication. > Chat and Email Importer

3. Capturing any information provided to clients in telephone calls outside the company. > Recording

(tick)

(tick)

(tick)

Identifying Relevant Interactions

4. Identifying relevant interactions by automatic tagging. > Automatic tagging

5. Identifying relevant interactions by manual tagging. > Manual tagging

(tick)

(tick)

Keeping Relevant Interactions

6. Keeping relevant interactions and protecting them against deletion for the period of 5 or 7 years. > Delete protection

(tick)

Auditing Data Flow and Data Access, Audit Logs and Media Files

To the competent authority shall be given the possibility to:

7. Be able to investigate data flows and data access. > Audit logs

8. Inspect Audit Logs or their exports. > User permissions and Audit log

9 On request, listen to or view the recordings. > Media export


(tick)

(tick)

(tick)

Complaints Management10. Firms shall establish a complaints management program.> Quality Management as a package supports this requirement(tick)
Complaints Training11. Investment firms shall educate and train employees in procedures governing the regulation requirements. > Training(tick)

Monitoring Complaints Conformity

12. Investment firms shall periodically monitor the records of transactions. > Reviews(tick)

In order to assist your compliance obligations we provide the following features:


1. Recording Rules

On-Premise Solution

Recording Rules provide an “opt-in” consent capability to ensure the call recording channel supports the additional level of detailed consent that the MiFID ll requires. Agents can contractually ask for consent during a call, and the customer’s consent can be recorded or added to the recording as meta-data—for example, to capture why something was recorded. Using the Eleveo Conversation Explorer, Compliance Analysts can search for personal information by various email and chat fields,including to/from/cc and the body of text-based conversations as well as call metadata.

Cloud Solution

Recording in the Cloud is dependent on the Cloud solution configured for your particular installation. The administrator for your integration will know more. Using the Eleveo Conversation Explorer, Compliance Analysts can search for personal information by various email and chat fields,including to/from/cc and the body of text-based conversations as well as call metadata.

Please contact an Eleveo representative for details.

2. Chat and Email Importer

Conversation Explorer Search Engine is a unique omni-channel conversations platform that is embedded in the Quality Management application in the form of the Conversation Explorer. The search engine expands the voice and screen design in Quality Management to other communication channels such as emails and chats, while also leveraging the existing user management, authentication, and authorization services.

The search engine behind the Conversation Explorer in Eleveo Quality Management with a built-in media player and support for the import of multiple source formats including Email and Chat.

3. Recording

Please contact an Eleveo representative for details.

4. and 5. Call Tagging

Tagging enables the Identification of Relevant Interactions. We provide the possibility to automatically tag conversations based on attributes or manually tag calls. The following section describes the various ways that tags can be applied.

Call segment tagging can be configured in:

  • Recording rules (automatic tagging)
  • API (Tagging by 3rd party application)
  • Cisco Finesse Gadgets (Manual tagging)
  • Using any external data (Automatic tagging with Contact Center Integration)

Recording Rules (Automatic Tagging) (on-premise and hybrid deployments only)

Automatic tagging is configurable separately for each recording rule. If the call segment matches the recording rule, the TAG will be added to the specific call segment. Both Phone number-based and External data-based recording rules can be used.  

The recording rules are processed from TOP to DOWN.

Example:

  • 1st recording rule: Record Extension 2180 without TAG
  • 2nd recording rule: Record Extension 2178 with TAG

Tagging

  • When a customer calls extension 2178, the call segment will be tagged, because the 2nd rule is matched.
  • When a customer calls extension 2180, the call segment will NOT be tagged, because the first recording rule is matched.
  • Each call segment between extensions 2180 and 2178 will NOT be tagged, because the first recording rule is matched.

API (Tagging by 3rd Party Application)

Tagging via API is functional only when the call is actively recorded. Tagging does not require that there be a  special recording rule with tagging enabled.

Tagging via API requires the configuration of TAGs by an Eleveo administrator.

  • TAG is attached to the active call segment only. If all call segments have to be tagged, each call segment has to be tagged separately. 
  • If the call is on HOLD or RTP streams are not captured, the system responds with "no active call" information.

Cisco Finesse Gadgets (Manual Tagging) Hybrid deployments only

Cisco Finesse Gadgets uses the API functionality and displays the same limitations as seen with API tagging. This tagging does not require any special recording rule with tagging enabled.

Tagging via API using Cisco Finesse Gadgets requires the configuration of TAGs by an Eleveo administrator.

If the call is on HOLD or RTP streams are not captured, the system responds with "no active call" information.

A TAG is attached to the active call segment only. If all call segments have to be tagged, each call segment has to be tagged separately.

Configuring MLM

Call delete protection

In order to protect tagged call segments from deletion by the MLM tools it is necessary to add additional configuration to the Delete Tool. This configuration does not require that advanced search fields be configured. Call segment without the TAG will be deleted as set by the delete tool task settings.

Archive tagged calls to separate directories (on-premise and hybrid deployments only)

In order to be able to archive tagged calls to a separate directory is required to configure an advanced search field for TAGs represented by an External Data Key. The configuration of advanced search fields is in Settings > Configuration > Web UI > Search. After the advanced searches are set up the External Data Key name appears in the drop-down menu of call selection for archiving in Settings > Configuration > Maintenance > Archive. Setup the condition for TAG value for the specific archive task. Each archive task provides the possibility to save archive files into a separate destination directory into which can be mounted separate network drive.

Call Flow Examples and Call Tagging (on-premise and hybrid deployments only)

This paragraph describes basic call flows with a description of which call segments have the TAG attached after they are saved into the DB.

Basic call (no hold, no transfer)

  • REC Rules: Customer calls to extension 2178 with configured tagging in Rec Rules (TAG)
  • API: Customer calls Agent and tag is added via API (TAG_API)
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN)
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_CCE)

Rec rulesAPIGadgetsUCCE IM
1st segmentTAGTAG_APITAG_FINTAG_CCE


Basic call with hold (no transfer) - 1st segment

  • REC Rules: Customer calls to extension 2178 with configured tagging in Rec Rules (TAG)
  • API: Customer calls Agent and tag is added via API (TAG_API) before HOLD
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN) before HOLD
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_CCE) before HOLD

Rec rulesAPIGadgetsUCCE IM
1st segmentTAGTAG_APITAG_FINTAG_CCE
2nd segmentTAG--TAG_CCE


Basic call with hold (no transfer) - 2nd segment

  • REC Rules: Customer calls to extension 2178 with configured tagging in Rec Rules (TAG)
  • API: Customer calls Agent and tag is added via API (TAG_API) after HOLD
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN) after HOLD
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_CCE) after HOLD

Rec rulesAPIGadgetsUCCE IM
1st segmentTAG---
2nd segmentTAGTAG_APITAG_FINTAG_CCE

Transferred call (blind transfer)

  • REC Rules: Customer calls to extension 2178 (2nd rec rule) with configured tagging in Rec Rules (TAG). After that the call is transferred to extension 2180 (1st rec rule) with recording rule set WITHOUT tagging
  • API: Customer calls Agent and tag is added via API (TAG_API) before TRANSFER. After that the call is transferred to extension 2180.
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN) before TRANSFER. After that the call is transferred to extension 2180.
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_CCE) before TRANSFER. After that the call is transferred to extension 2180

Rec rulesAPIGadgetsUCCE IM
1st segmentTAGTAG_APITAG_FINTAG_CCE
2nd segment---TAG_CCE

Transferred call (consult transfer)

In this scenario 3 segments will be created:

  1. Customer - Agent1 (2178)
  2. Consultation Agent1 (2178) and Agent 2 (2180). This consultation is evaluated as a separate call
  3. Customer - Agent2 (2180)
  • REC Rules: Customer calls to extension 2178 (2nd rec rule) with configured tagging in Rec Rules (TAG). After that the call is transferred to extension 2180 (1st rec rule) with recording rule set WITHOUT tagging.
  • API: Customer calls Agent and tag is added via API (TAG_API) before TRANSFER followed by consult and transfer to extension 2180.
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN) before TRANSFER followed by consult and transfer to extension 2180.
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_CCE) before TRANSFER followed by consult and transfer to extension 2180.

Rec RulesAPIGadgetsUCCE IM
1st segmentTAGTAG_APITAG_FINTAG_CCE
2nd segment----
3rd segment---TAG_CCE

Basic call with hold with updating TAGs

In this example will set TAG_XX=1 which is changed to TAG_XX=2 before HOLD. After the HOLD the TAG_XX is changed to TAG_XX=3.

  • REC Rules: Customer calls to extension 2178 with configured Tagging in Rec Rules (TAG)
  • API: Customer calls Agent and tag is added via API (TAG_API=1) and later changed to (TAG_API=2) before HOLD. After HOLD the (TAG_API=3) is added.
  • Gadgets:  Customer calls Agent and tag is added via Finesse Agent Desktop (TAG_FIN=1) and later changed to (TAG_FIN=2) before HOLD. After HOLD (TAG_FIN=3) is added.
  • UCCE IM:  Customer calls Agent and tag is added by UCCE IM (TAG_API=1) and later changed to (TAG_API=2) before HOLD. After HOLD the tag is changed to (TAG_API=3).



Rec rulesAPIGadgetsUCCE IM
1st segmentTAGTAG_API=2TAG_FIN=2TAG_CCE=2
2nd segmentTAGTAG_API=3TAG_FIN=3TAG_CCE=3

6. Protection Against Deletion

Please contact an Eleveo representative for details.

7. and 8. User Permissions and Audit Logs

Audit Log in User Management

For User Management, please refer to the dedicated guides.

Audit Log in Quality Management

Using the Audit Log

The Audit Log tracks all user activities within the Eleveo applications (Quality Management, as well as User Management) for enhanced security and compliance purposes. By default, viewing and using the Audit Log is only available to users with the CC Manager or Compliance Analyst roles.

  1. From the left menu, select Administration > Audit Log. The Audit Log screen will display recent events.
  2. You may filter results by Time Period, Activity, User or Result. By default, events from the past 10 days are displayed.
  3. Click the Reset Filters icon (
    ) beside a filtering option in order to clear each of the filters individually.
  4. Or click on the trash can icon
    to clear all filters and revert to the default setting.
  5. The search will refresh every time the filters are changed. You can also click on the refresh icon
    to force refresh the results.
  6. Hover over the info icon
    to view details of the user who performed an audited action.

The Audit Log messages are not localized, however, the name of some items (such as the name of tabs, or other items displayed in the Web UI) are displayed in the log in the language of the audited user.

Information Displayed

The Audit Log displays the following:

  • Date: The timestamp indicates the date and time when the auditable activity occurred. The time displayed in the log corresponds to the timezone of the current user. Not necessarily the server timezone. 
  • Activity: Indicates the activity that triggered the creation of the log entry. Actions displayed in this list range from; when a user logs into the application, to the creation of an evaluation, to the deletion of a call. A more complete list of activities is provided in the section below.
  • User: Displays the full name of the user who triggered the auditable action.
  • Username: Displays the username of the user who triggered the auditable action. (The username is the same as that used on the login screen.)
  • Description: Provides a more fine-grained detail of the activity which was logged. Usually, the details include the id of the user who performed the action, but the actual details depend on the type of activity. The description field only displays what is provided by the backend in the json file, in some cases only a user ID is displayed. If it is necessary to determine which user matches a particular id, then it is necessary to access the database directly. For example, to determine a user related to a conversation search go to the Encourage database, and examine the Table of Users.
  • Result: Status message of the Requests and Responses (see below for a detailed explanation). Each completed action is listed in the log with an indication of success (OK), failure (FAIL) or lack of permission (UNAUTHORIZED).

QM Events

The QM activities that trigger the creation of the log entry can be divided into two groups: synchronous and asynchronous.

Asynchronous Events

All actions triggered from within the Conversation Explorer and Administrative screens in Quality Management (Compliance, Audit, Data Lifecycle, UI configuration, Tags) trigger the creation of multiple records in the Audit Log list. Each received request is listed in the log without a status message. Each completed action is listed in the log with an indication of success (OK), failure (FAIL) or lack of permission (UNAUTHORIZED).

For instance, pressing the Search button on Conversation Explorer leads to the creation of two log entries, one for each action:

  1. request search (begins),
  2. request search (ends).

In the example provided here, the bottom row indicates that a user performed a search of conversations (no result is displayed as this is only the start of the request). The upper row indicates the successful completion of the request. Success here is indicated by the "OK" status in the Result column.

Administrators can compare the timestamp of the request received and the request completion. Long delays between the two may be indicative of connectivity related issues.

Synchronous Events

Activities triggered on other screens with Quality Management lead to the creation of a single mention in the log with an indication of success (OK), failure (FAIL) or lack of permission (UNAUTHORIZED).

The Full List of Events

Click here to expand...

The table below contains all activities that trigger the creation of the log entry, as well as an indication if they are synchronous or asynchronous.

ModuleActivityDescriptionAsynchronousSynchronous
Conversation ExplorerCONVERSATION_EVENT_ANONYMIZE_ADDAnonymization of the conversationx

CONVERSATION_BY_IDInteraction lookup by IDx

CONVERSATION_EVENT_CHAT_CHANGEChat updatedx

CONVERSATION_CLIENT_SEARCHInteraction(s) searched forx

CONVERSATION_EVENT_EMAIL_CHANGEEmail updatedx

EXPORT_EXECUTEInteraction metadata exportedx

CONVERSATION_EVENT_METADATA_CHANGEMetadata updatedx

CONVERSATION_EVENT_REVIEW_ADDReview addedx

CONVERSATION_EVENT_REVIEW_CHANGEReview changedx

CONVERSATION_SEARCHInteraction(s) searched forx

CONVERSATION_EVENT_SURVEY_ADDSurvey addedx

CONVERSATION_EVENT_SURVEY_CHANGESurvey changedx

CONVERSATION_EVENT_TAG_ADDInteraction tag addedx

CONVERSATION_EVENT_TAG_REMOVEInteraction tag removedx

CONVERSATION_EVENT_TAG_UPDATEInteraction tag updatedx
Automated Quality ManagementAUTOMATED_RULE_CREATEDRule createdx

AUTOMATED_RULE_MODIFIEDRule updatedx

AUTOMATED_RULE_DELETEDDraft rule deletedx
AdministrationAUDIT_SEARCHAudit page search usedx

FIELD_CONFIG_LISTConfiguration field list showedx

FIELD_CONFIG_UPDATEConfiguration field updatedx

LABEL_CREATEUser label createdx

LABEL_DELETEUser label deletedx

LABEL_UPDATEUser label updatedx

METADATA_KEY_UPDATEMetadata key for search updatedx

PASSWORD_CREATEPassword createdx

SEARCH_TEMPLATE_UPDATESearch template updatedx

SAVED_FILTER_SEARCH

Saved Filters searched by name, or displayedx

SAVED_FILTER_ASSIGNMENT_MODIFIEDAssignment of users to a saved filter modifiedx

USER_LISTUser list displayedx

EDIT_AUDIT_REASONReplace reason changedx

MERGE_AUDIT_REASONReplace reason mergedx

FIELD_CONFIG_LISTConfiguration field list showedx

FIELD_CONFIG_UPDATEConfiguration field updatedx

METADATA_KEY_UPDATEMetadata key for search updatedx
ReviewsCREATE_EVALUATIONReview created
x

START_EVALUATIONReview started
x

COMPLETE_EVALUATIONReview completed
x

DELETE_EVALUATIONReview deleted
x

DELETE_FINISHED_EVALUATIONFinished review deleted
x

EVALUATION_REPORT

Review report viewed


x

EVALUATIONS_SEARCHSearched for review
x

REALLOCATE_EVALUATIONS

Reviews reallocated


x

REPLACE_CALLCall replaced in review
x

REOPEN_EVALUATIONReview reopened
x

ADD_INTERACTION_TYPEInteraction type added to review
x

ADD_PARTICULAR_CALLParticular call added to review
x

EDIT_EVALUATORS_GROUPEvaluators group edited
x

EDIT_GROUPGroup edited
x

EDIT_INTERACTION_TYPEInteraction type edited
x

EDIT_OPTIONSOptions edited
x

REVEAL_TO_AGENT_CHANGEDReveal to agent state changed
x

SAVE_EVALUATIONEvaluation saved
x
QuestionnairesADD_QUESTIONAIREQuestionnaire added
x

REMOVE_QUESTIONAIRE

Questionnaire removed


x

EDIT_QUESTIONAIRE

Questionnaire edited


x

EDIT_QUESTIONAIRE_CALL_SELECTION_RULES

Questionnaire call selection rules edited


x

EDIT_QUESTIONAIRE_PROPERTIES

Questionnaire details edited


x

EDIT_QUESTIONAIRE_PERMISSIONS

Questionnaire permissions edited


x

ADD_SCORING_TIERScoring Tier created
x

UPDATE_SCORING_TIERScoring Tier updated
x

REMOVE_SCORING_TIERSScoring Tiers removed
x
SurveysSURVEYS_SEARCHSurvey(s) searched for
x
TrainingTRAININGS_SEARCHTrainings searched for
x
Speech Recognition

ADD_SPEECH_TAG

Speech tag added
x

EDIT_SPEECH_TAG

Speech tag edited


x

REMOVE_SPEECH_TAG

Speech tag deleted


x
Data ExportDATA_EXPORT_CREATE

Data Export Created


x

DATA_EXPORT_DELETE

Data Export Deleted


x

DATA_EXPORT_CHANGED

Data Export Updated


x

DATA_EXPORT_DOWNLOAD

Output file downloaded


x

DATA_EXPORT_EMAILED

Output file emailed


x

DATA_EXPORT_RUN_MANUAL

Task Execution Manual


x

DATA_EXPORT_RUN_SCHEDULEDData Export scheduled execution
x
MiscTAB_CLOSED

Tab is closed


x

TAB_OPENED

Tab is opened


x

TAB_FOCUSED

Tab is focused


x

ACCESS_MEDIA

Media accessed


x

ADD_GROUPGroup added
x

DELETE_CALL*Call deleted
x

REMOVE_INTERACTION_TYPEInteraction type removed
x

REMOVE_GROUPGroup removed
x

SEND_FEEDBACKAgent feedback sent
x

SEND_RECORDINGRecording sent
x

SYNCHRONIZE_NOWRemote user synchronization forced
x

INCLUDE_IN_REPORTS_CHANGEDInclude in reports review status changed
x

EDIT_AUDIT_REASONReplace reason changed
x

EDIT_USERUser edited
x

MERGE_AUDIT_REASONReplace reason merged
x

USER_LOGINInteraction Tag name edited
x

USER_LOGOUTUser logged out
x

USER_PROFILE_CHANGE_DELEGATEUser profile delegation changed
x

*This event is triggered when a subevaluation is deleted (not when a call/conversation is deleted).

UM Events

Actions triggered from within User Management represent all access-related activities performed by users (for example: login, logout, requesting a token etc.).

View list of Login Events in UM...

The following list is representative of the Login Events in User Management:

ModuleActivityDescriptionAsynchronousSynchronous
Custom ActivitiesACTION_PUSHER_SYNCSynchronization with pusher triggered
x

CREATE_CUSTOM_ROLECustom role created
x

CREATE_CUSTOM_ROLE_MAPPINGRole mapping to custom role created
x

CREATE_LICENSELicense file imported to user management
x

CREATE_PROVIDER_CLIENTProvider client created
x

CREATE_SUPERVISOR_MEMBERSHIPSupervisor membership created
x

DELETE_CUSTOM_ROLECustom role deleted
x

DELETE_CUSTOM_ROLE_MAPPINGRole mapping to custom role deleted
x

DELETE_EVENTSEvents deleted
x

DELETE_IMPORTED_USERSImported users deleted
x

DELETE_PROVIDER_CLIENTProvider client deleted
x

DELETE_SUPERVISOR_MEMBERSHIPSupervisor membership deleted
x

UPDATE_CUSTOM_ROLECustom role updated
x

UPDATE_REALM_SETTINGSRealm settings updated
x

UPDATE_SUPERVISOR_MEMBERSHIPSupervisor membership updated
x

UPDATE_USER_EXTENSIONUser extension updated
x
Build-in ActivitiesAUTHREQID_TO_TOKENClient initiated backchannel authentication (CIBA) token granted
x

AUTHREQID_TO_TOKEN_ERRORError on granting CIBA token
x

CLIENT_DELETEClient deleted
x

CLIENT_DELETE_ERRORError on client deletion
x

CLIENT_INFOClient info obtained during client registration
x

CLIENT_INFO_ERRORError on getting client info
x

CLIENT_INITIATED_ACCOUNT_LINKINGUser account linked with external identity provider using specific client
x

CLIENT_INITIATED_ACCOUNT_LINKING_ERRORError on client initiated account linking
x

CLIENT_LOGINClient logged in 
x

CLIENT_LOGIN_ERRORError on client login
x

CLIENT_REGISTERClient registered
x

CLIENT_REGISTER_ERRORError on client registration
x

CLIENT_UPDATEClient updated
x

CLIENT_UPDATE_ERRORError on client update
x

CODE_TO_TOKENAuthorization code exchanged for a token
x

CODE_TO_TOKEN_ERRORError on exchanging authorization code for a token
x

CUSTOM_REQUIRED_ACTIONCustom required action triggered
x

CUSTOM_REQUIRED_ACTION_ERRORError on custom required action
x

DELETE_ACCOUNTUser deleted its account via manage acount console
x

DELETE_ACCOUNT_ERRORError on account deletion
x

EXECUTE_ACTIONSAction executed
x

EXECUTE_ACTIONS_ERRORError on executing action
x

EXECUTE_ACTION_TOKENToken permitting specific action executed
x

EXECUTE_ACTION_TOKEN_ERRORError on action token execution
x

FEDERATED_IDENTITY_LINKUser account linked with federated identity provider
x

FEDERATED_IDENTITY_LINK_ERRORError on federated identity link
x

GRANT_CONSENTConsent granted
x

GRANT_CONSENT_ERRORError on consent grant
x

IDENTITY_PROVIDER_FIRST_LOGINLogin with identity provider triggered for the first time
x

IDENTITY_PROVIDER_FIRST_LOGIN_ERRORError on identity provider first login
x

IDENTITY_PROVIDER_LINK_ACCOUNTIdentity provider account linked
x

IDENTITY_PROVIDER_LINK_ACCOUNT_ERRORError on identity provider link account
x

IDENTITY_PROVIDER_LOGINIdentity provider used to log in
x

IDENTITY_PROVIDER_LOGIN_ERRORError on identity provider login
x

IDENTITY_PROVIDER_POST_LOGINIdentity provider post login action triggered
x

IDENTITY_PROVIDER_POST_LOGIN_ERRORError on identity provider post login
x

IDENTITY_PROVIDER_RESPONSEIdentity provider responded
x

IDENTITY_PROVIDER_RESPONSE_ERRORIdentity provider response error
x

IDENTITY_PROVIDER_RETRIEVE_TOKENIdentity provider token retrieved
x

IDENTITY_PROVIDER_RETRIEVE_TOKEN_ERRORError on identity provider retrieve token
x

IMPERSONATELogged user is switched/impersonated to other user
x

IMPERSONATE_ERRORError on user impersonation
x

INTROSPECT_TOKENToken introspected
x

INTROSPECT_TOKEN_ERRORError on introspect token
x

INVALID_SIGNATUREInvalid certificate signature
x

INVALID_SIGNATURE_ERRORInvalid signature error
x

LOGINUser logged in
x

LOGIN_ERRORError on user login
x

LOGOUTUser logged out
x

LOGOUT_ERRORError on user logout
x

OAUTH2_DEVICE_AUTHDevice authorization
x

OAUTH2_DEVICE_AUTH_ERRORError on device authorization
x

OAUTH2_DEVICE_CODE_TO_TOKENDevice authorization code for token
x

OAUTH2_DEVICE_CODE_TO_TOKEN_ERRORError on exchanging device authorization code for token
x

OAUTH2_DEVICE_VERIFY_USER_CODEDevice user code verified
x

OAUTH2_DEVICE_VERIFY_USER_CODE_ERRORError on user code verification
x

PERMISSION_TOKENUser management access (UMA) token grant type requested
x

PERMISSION_TOKEN_ERRORError on UMA token grant request
x

PUSHED_AUTHORIZATION_REQUESTAuthorization request pushed
x

PUSHED_AUTHORIZATION_REQUEST_ERRORError on pushing authorization request
x

REGISTERUser registered
x

REGISTER_ERRORError on user register
x

REGISTER_NODENew client cluster node registered
x

REGISTER_NODE_ERRORError on registering client cluster node
x

REMOVE_FEDERATED_IDENTITYFederated identity removed
x

REMOVE_FEDERATED_IDENTITY_ERRORError on removing federated identity
x

REMOVE_TOTPTime-based one-time password removed
x

REMOVE_TOTP_ERRORError on remove time-based one-time password
x

RESET_PASSWORDPassword reset
x

RESET_PASSWORD_ERRORError on password reset
x

RESTART_AUTHENTICATIONAuthentication restarted
x

RESTART_AUTHENTICATION_ERRORError on authentication restart
x

REVOKE_GRANTToken grant revoked
x

REVOKE_GRANT_ERRORError on token revoke grant 
x

SEND_IDENTITY_PROVIDER_LINKIdentity provider link sent
x

SEND_IDENTITY_PROVIDER_LINK_ERRORError on sending identity provider link
x

SEND_RESET_PASSWORDReset password sent
x

SEND_RESET_PASSWORD_ERRORError on sending reset password
x

SEND_VERIFY_EMAILVerify email sent
x

SEND_VERIFY_EMAIL_ERRORError on sending verify email
x

TOKEN_EXCHANGEToken exchanged
x

TOKEN_EXCHANGE_ERRORError on token exchange
x

UNREGISTER_NODEClient cluster node unregistered
x

UNREGISTER_NODE_ERRORError on client cluster node unregistration
x

UPDATE_CONSENTUser consent updated
x

UPDATE_CONSENT_ERRORError on user consent update
x

UPDATE_EMAILEmail updated
x

UPDATE_EMAIL_ERRORError on update email 
x

UPDATE_PASSWORDPassword updated
x

UPDATE_PASSWORD_ERRORError on update password
x

UPDATE_PROFILEProfile updated
x

UPDATE_PROFILE_ERRORError on update profile
x

UPDATE_TOTPTime-based one-time password updated
x

UPDATE_TOTP_ERRORError on update time-based one-time password
x

VALIDATE_ACCESS_TOKENAccess token validated
x

VALIDATE_ACCESS_TOKEN_ERRORError on validating access token
x

VERIFY_EMAILEmail verified
x

VERIFY_EMAIL_ERRORError on verify email
x

VERIFY_PROFILEProfile verified
x

VERIFY_PROFILE_ERRORError on verifying profile 
x

9. Media Export

To learn more about the export possibilities, please see the Export section of the Quality management guide.

10. Quality Management

Eleveo provides a complete set of integrated solutions to effectively manage your contact center or unified communications environment. For more detailed information, please consult the Quality Management - User Guide

11. Training

Eleveo enables enhanced agent training. The following section describes how eLearning is used to quickly improve knowledge transfers across contact centers. 

eLearning involves either training new hires who have little or no knowledge of the subject, or training agents with low evaluation scores. Either way, good trainers know that trainees must be tested to ensure that they understand everything.

Good training includes:

  • Training instructions.
  • A reference interaction that the trainee can listen to.
  • A presentation with interactive pictures and sound.
  • A quiz to help the trainer see how well the trainee has digested all the information.

Training is usually provided in the following cases:

  • Taking new agents on board
  • Training/Coaching Packs for supervisors
  • Coaching agent performance

Taking New Agents on Board

A contact center's largest expense is employee salaries. When a company hires an agent, it faces considerable costs to train the agent, and it can take months before the company will see a return on investment. eLearning both distributes content and tests new agents, allowing them to digest important information and review it as necessary. This solution reduces time and effort across training teams by allowing them to focus on the agents that need additional help or quickly weeding out agents that may not be the right fit for the company. New agents become used to the applications and can self-study with minimal impact on their calling time. Most importantly agents are able to review areas that are difficult or challenging to be sure they know what they need to know.

eLearning and Coaching Packs for Supervisors

Supervisors are responsible for managing teams of agents and their overall performance. All supervisors are not created equal. Targeted and quick coaching helps them support agents in their daily activities. Managers can also send coaching and eLearning content directly to their supervisory team with best practices for:

  • Coaching
  • Motivation
  • Goal setting
  • Performance management
  • Disciplinary procedures 
  • New processes, programs or product updates

By fully informing supervisors and team leaders of best practices, companies can make sure that these practices are implemented and calibrated across all processes. To this end all eLearning packs include a quiz to ensure uptake and measurable understanding of the content. This lets the contact center know that everyone is up to date and are all working in the same direction.

Coaching Agent Performance

It's an extremely tough job to ensure that all agents meet company KPIs. When one agent improves it’s likely another drops, and the effort to keep all agents on a path of continuous improvement is difficult at best. eLearning allows supervisors to provide training and coaching to all agents under their management with a few clicks. This guarantees that every agent receives the same information. While freeing supervisors to review and measure test results.

12. Reviews

We support regular review of conversations via built-in review functionality. For more detailed information, please see the relevant documentation.

The Reviews pages guide you through the review process in contact centers, such as creating and using standardized reviews or generating standardized review data using Quality Management. 

The following pages describe the steps in the review process.

V 9.x does not support the import of reviews that use sub-criteria.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.