Call Recording on the Record - Regulations in the Contact Center - Prepared by Industry Analyst Dick Bucci Principal, Pelorus Associates - Nice

Page created by Darrell Stevenson
 
CONTINUE READING
Call Recording on the Record - Regulations in the Contact Center - Prepared by Industry Analyst Dick Bucci Principal, Pelorus Associates - Nice
Call Recording on the
Record - Regulations in the
Contact Center
Prepared by Industry Analyst Dick Bucci

Principal, Pelorus Associates
Table of Contents

            Introduction                                                                 3

            Consent to Record                                                            6

            Payment Card Industry Data Security Standard (PCI-DSS)                       9

            General Data Protection Regulation (GDPR)                                    12

            Markets in Financial Instruments Directive II (MiFID II)                     15

            Privacy Rule - Health Insurance Portability and Accountability Act (HIPAA)   18

            Telemarketing Sales Rule (TSR)                                               22

            NICE Compliance Center                                                       26

2 | Copyright © 2018 NICE Ltd. All rights reserved
INTRODUCTION

   The headline on the press release from the Federal Trade Commission read, “Utah operation responsible for making more
   than 117 million illegal telemarketing calls.” The statement explained that a jury trial found the company violated six different
   Telemarketing Sales Rule (TSR) provisions. The FTC imposed a $45.5 million civil penalty. The TSR is one of many USA laws
   enacted to protect consumers.

   Since the passage of the Dodd Frank Wall Street Reform and Consumer Protection Act in 2010 enforcement of these laws
   and regulations has intensified. One of the results of Dodd Frank was the creation of the Consumer Financial Protection
   Bureau which now has regulatory authority for 17 federal laws that were previously administered by separate agencies. It is
   noteworthy that since 2010 nearly $1 billion in penalties and mandated restitutions have been assessed because of violations
   that occurred in contact centers.

   Looking ahead, we can anticipate continued growth in laws and regulations, particularly in the matter of consumer privacy
   rights. There been several highly publicized breaches both in the United States and globally that have caught the attention of
   legislators. With recent passage of the General Data Protection Regulation the European Union is well ahead of the United
   States in terms of privacy protections. However, it is reasonable to assume that public outcry in the US will drive adoption of
   the same or similar provisions embodied in the GDPR.

   Why contact centers?
   Contact centers can be unwitting offenders of relevant laws and regulations for these key reasons:

   •   Primary point of contact- The sheer volume of interactions coupled with the high turnover of agent staff produces a
       reasonable likelihood that someone at some time is going to make a mistake.

   •   Agents and supervisors are not well-versed on regulations - Contact centers conduct extensive training on call control,
       courtesy, problem-solving, and salesmanship but do not always pay sufficient attention to fundamental legal obligations.
       No one in contact center management can be an expert on legalities but given the high-risk factor it is important to have
       a basic understanding of the requirements that impact your specific operations

   •   Pressures to meet KPIs and sales goals - Today customer service representatives have multiple and sometimes
       conflicting objectives and measurement metrics. There is intense pressure to meet KPIs and these often include revenue
       goals. This can lead to errors and omissions particularly in up selling.

   •   Ardent desire to please the customer -We want customers to be happy. An important metric of customer satisfaction
       is first call resolution. This can lead to temptations to make unauthorized commitments or shortcut detailed mandatory
       disclosures for the sake of pleasing the customer and getting a favorable post-call satisfaction review.

3 | Copyright © 2018 NICE Ltd. All rights reserved
INTRODUCTION

   Purpose and scope
   Reading this resource guide won’t make you an expert and won’t relieve you of the necessity of checking with your
   compliance officers or legal resources in time of need. However, we can almost guarantee that you will learn something new
   and have a better understanding of the current legal and regulatory environment as it concerns your specific responsibilities.
   We can’t emphasize enough that this is a very handy resource guide, not a legal document. We recommend that you
   become a member of a trade association that retains legal counsel and issues periodic alerts and guidelines. If your firm or
   organization has a compliance office, work closely with them to assure that the steps you take are the correct ones and in
   keeping with overall corporate policies and IT established processes.

   There are literally hundreds of laws, regulations, rulings, and industry standards that can affect contact center practices. We
   will discuss only the statutes and standards that – in the author’s view – most directly impact the broadest range of contact
   centers. Further, the scope is limited to the United States and the European Union. In the United States federal laws apply
   to interstate commerce. Typically, individual states enact similar legislation to address intra-state commerce. In the case of
   the data security standards for payment cards, requirements are established by an industry organization but over 30 states
   have codified some or all of the standards into state statutes. In the European Union the General Data Privacy Regulation is
   a legal requirement for all member states. Individual nations may enact more restrictive requirements. In the EU, regulations
   have binding legal force. By contrast, the Markets in Financial Instruments Directive (MiFID II) lays down certain results that
   must be achieved but each Member State is free to decide how to transpose directives into national law

   The following table lists the statutes and standards covered in this guide and their primary focus:

                                                                                           Prevent       Stem         Protect
    Title                                        Geography        Regulatory body
                                                                                           fraud         abuse        privacy
    Payment Card Industry Data Security                           Major card Issuers, 38
                                                 Global
    Standards                                                     US States

                                                                  European Data
    General Data Protection Regulation           European Union
                                                                  Protection Board

    Markets in Financial Instruments                              European Markets and
                                                 European Union
    Directive II                                                  Securities Authority

    Health Insurance Portability and                              Health and Human
                                                 USA
    Accountability Act                                            Services Dept.

                                                                  Federal Trade
    Telemarketing Sales Rule                     USA
                                                                  Commission

    Consent to Record                            States           Individual States

4 | Copyright © 2018 NICE Ltd. All rights reserved
INTRODUCTION

   Recommendations
   •   Contact center leaders cannot be experts on everything so strive to understand the business you are in and focus on
       key laws and regulations that affect your business. For example, if your company is involved in the healthcare space you
       need to understand the privacy provisions of the Health Insurance Portability and Accountability Act.

   •   Conduct periodic training. There is turnover, people forget, and the rules change.

   •   Provide scripts where mandatory disclosures are required and use tools such as text messaging for reminders and
       speech analytics to flag possible violations

   •   Police the workplace. There is a lively trade in personally identifiable information. Make sure your people are not jotting
       down credit card numbers, reciting them out loud for others to hear, or using thumb drives to capture information.

   •   Personally identifiable information should be encrypted.

   •   Be cognizant that there are no exceptions for smaller companies. For example, the TSR applies to individual sales reps
       as well as contact centers.

   •   Be proactive in explaining your technology to other functions within the enterprise that deal with confidential information
       or interface with customers. These may include service departments, collections departments, and human resources.
       From the standpoint of the law these are call centers. Take the lead in explaining how interaction recording works and
       how it can benefit their functions.

   •   Maintain a compliance plan and develop KPIs to measure your success.

   •   Notify agents that their calls will be recorded and secure signed acknowledgments of the practice.

   •   Coordinate closely with compliance officers.

   •   Your hardware and software should be capable of recording and reconstructing multichannel communications. It should
       be quick and easy to retrieve specific interactions. Some laws require that recordings be archived for five or even seven
       years.

5 | Copyright © 2018 NICE Ltd. All rights reserved
Consent to Record

   Background
   In the United States the legal right to record conversations between two or more parties is addressed by both federal and
   state wiretapping laws. Federal laws are aimed at interstate and international calls. The Federal Electronic Protection Act
   permits recording of telephone calls and in-person conversations with the consent of at least one of the parties.

   Intent
   Federal laws are primarily intended to protect the privacy of its citizens and to support the lawful interception of
   communications intended to help solve or prevent crime. The Federal Wiretap Act protects individual privacy in
   communications with other people by imposing civil and criminal liability for intentionally intercepting communications using
   a device unless that interception falls within one of the exceptions in the statute. Although the Federal Wiretap Act originally
   covered only wire and oral conversations (e.g., using a device to listen in on telephone conversations), it was amended in
   1986 to cover electronic communications as well (e.g., emails or other messages sent via the Internet). State laws are also
   designed to protect privacy.

   Terms
   Consent is given if the parties to the call are clearly notified that the conversation will be recorded, and they engage in the
   conversation anyway. Under federal law consent may be explicit or implied. To achieve consent courts have held that is
   sufficient to establish that the consenting party received actual notice of the monitoring and used the monitoring system
   regardless.

   Scope
   In addition to federal law, thirty-eight states and the District of Columbia have adopted “one-party consent” laws and permit
   individuals to record phone calls and conversations to which they are a party or when one party to the communication
   consents. Eleven states require the consent of everybody involved in a conversation or phone call before the conversation
   can be recorded. Those states are: California, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New
   Hampshire, Pennsylvania and Washington. These laws are sometimes referred to as “two-party” consent laws but technically
   require that all parties to a conversation must give consent before the conversation can be recorded. Nearly all states include
   an extensive list of exceptions to their consent requirements. Generally, it is permissible to record conversations if all parties to
   the conversation are aware of and consent to the interception of the communication.

6 | Copyright © 2018 NICE Ltd. All rights reserved
Consent to Record

   Pertinent Provisions

   USA
   While federal law is clear about requiring only one-party consent, it is not always clear which state law takes precedence
   when calls are conducted between individuals in one-party consent states and two-party consent states. It is almost always
   illegal to record a phone call or private conversation to which you are not a party, do not have consent from at least one party,
   and could not naturally overhear.

   In all -party consent states employees must also consent to the recording or monitoring of the content of their
   communications. The Federal Communications Commission defines accepted forms of notification for telephone recording by
   telephone companies as:

   •   Prior verbal (oral) or written notification of all parties to the telephone conversation.

   •   Verbal (oral) notification before the recording is made. This is the most commonly used type.

   Canada
   Canada has an “all-parties’ consent” approach. To record a call, you need to obtain informed consent by notifying others on
   the call that you (1) intend to record the conversation (2) explain what the recording will be used for, and (3) explain that the
   call may only be recorded with each person’s consent.

   Finland
   In the case of private persons, calls and conversations may be recorded by any active participant. There is no requirement to
   make other parties aware of the recording, but the use of recordings, depending on their content, may be subject to various
   laws, such as data protection (privacy) legislation, libel laws, and others.

   Germany
   Germany is a two-party consent country, meaning telephone recording without the consent of the two or, when applicable,
   more, parties is a criminal offense. In addition, Germany requires that VOIP users have a German address to use a German
   number.

   United Kingdom
   Call recording in the UK is subject to several laws. It’s best to think of the UK as a Two-Party Consent jurisdiction.

7 | Copyright © 2018 NICE Ltd. All rights reserved
Consent to Record

   Penalties
   In the United States it is a federal crime to use or disclose any information acquired by illegal wiretapping or electronic
   eavesdropping. Each state within the USA or other nations establishes its own penalties Violations can result in imprisonment
   for not more than five years; fines up to $250,000 (up to $500,000 for organizations); in civil liability for damages, attorney’s
   fees and possibly punitive damages and disciplinary action against any attorneys involved; and in suppression of any
   derivative evidence.

   Importance to Contact Centers
   State laws vary greatly. For contact centers which operate only in one-party consent states it is not necessary to provide
   advance notification of recording. However, as a courtesy it may still be advisable to alert customers that they may be
   recorded. For contact centers that receive or originate calls to or from all-party consent states or Canada, it is advisable to
   request and record an affirmative consent to proceed with the conversation. In the event one or more parties declines to be
   recorded then recording should cease for that interaction.

   The recording system should record the disclaimer that precedes the conversation, (“This call may be recorded….” In addition
   to the conversation itself. If the contact center is based in an all-party consent state management should secure a signed
   acknowledgment from each employee that they understand that their calls may be recorded.

8 | Copyright © 2018 NICE Ltd. All rights reserved
Payment Card Industry Data Security
   Standard
   PCI-DSS

   Background
   The Payment Card Industry (PCI), which consists of American Express, Discover Financial Services, JCB, MasterCard
   Worldwide and Visa International, established the PCI Security Standards Council in September 2006. The council
   subsequently issued a Data Security Standard (PCI-DSS) which details security requirements for members, merchants and
   service providers that store, process or transmit cardholder data. Among other provisions, the PCI regulations specifically
   forbid storing unencrypted credit card numbers, PIN numbers, and other specified identifiers. Payment processors, service
   providers and merchants that process more than 20,000 e- commerce transactions and over 1 million regular transactions
   are required to engage a PCI-approved Qualified Security Assessor (QSA) to conduct a review of their information security
   procedures and scan their Internet points of presence on a regular basis. However, no organization that accepts cards issued
   by the founding members of the council is exempt from compliance.

   Compliance with the data security standard is not a federal regulatory requirement. However, 38 states have now codified
   variations of PCI-DSS. The standard is periodically updated primarily to address new threats and support evolving
   technologies. Most call centers have a recording system which can capture the customer’s recitations of card data or DTMF
   tones of the card information as entered on the keypad. This recorded data is accessible to many individuals within contact
   center. Therefore, contact centers are highly susceptible to violations of the data security.

   Scope
   The standard applies to all businesses of all sizes worldwide which accept our process credit or debit cards issued by
   American Express, Discover Financial Services, JCB International, MasterCard, and Visa Inc.

   Intent
   The Data Security Standard is intended to combat credit card and debit card fraud. In the United States 15.4 million
   consumers were victims of credit card identity theft. Total losses in 2016 are estimated at $16 billion. In most cases the
   issuing financial institution is responsible for individual losses more than $50.

   Pertinent Provisions
   It is a violation of PCI DSS Requirement 3.2 to store any sensitive authentication data, including card validation codes
   and values, after authorization even if encrypted. The standard prohibits the use any form of digital audio recording (using
   formats such as WAV, MP3, etc.) for storing CAV2, CVC2, CVV2 or CID codes after authorization if that data can be queried;
   recognizing that multiple tools exist that potentially could query a variety of digital recordings.

9 | Copyright © 2018 NICE Ltd. All rights reserved
PCI-DSS

                                                                               Render Stored Account
                                                                    Storage
                                              Date Element                      Data Unreadable per
                                                                   permitted
                                                                                  Requirement 3.4

                                             Primary Account
                                                                      Yes               Yes
                                              Number (PAN)

                                             Cardholder Name          Yes               No

                       Cardholder Data

                                               Service Code           Yes               No
      Account Data

                                              Expiration Date         Yes               No

                                            Full Magnetic Stripe                  Cannot store per
                                                                      No
                                                   Data†                          Requirement 3.2

                          Sensitive         CAV2/CVC2/CVV2/                       Cannot store per
                                                                      No
                     Authentication Data*         CID                             Requirement 3.2

                                                                                  Cannot store per
                                              PIN/PIN Block           No
                                                                                  Requirement 3.2

  Instructions from the payment card industry stipulate that “Where technology exists to prevent recording of these data
  elements, such technology should be enabled.” Such technology does exist and is provided by leading producers of
  recording solutions including NICE Systems.

  The standard applies to all individuals and functions which accept payment via member debit and credit cards. If recorded,
  the same data security requirements apply. Further, effective February 1, 2018 (PCI DSS 3.2) the standard also requires
  multifactor authentication to access cardholder data. In addition to a password or other single form of authentication,
  individuals must also present at least one other form of authentication such as a token, smartcard, or a biometric indicator.

  Penalties
  Noncompliance Fines- The consequences of not being PCI compliant range from $5,000 to $500,000, which is levied by
  banks and credit card institutions. Banks may assess fines based on forensic research they must perform to remediate
  noncompliance. Credit card institutions may levy fines as a punishment for noncompliance and propose a timeline of
  increasing fines. The following table is an example of a time-cost schedule which Visa uses.

10 | Copyright © 2018 NICE Ltd. All rights reserved
PCI-DSS

    Month                                Level 1                        Level 2
    1-3                                  $10,000 monthly                $5,000 monthly

    4-6                                  $50,000 monthly                $25,000 monthly

    7 and on                             $100,000 monthly               $50,000 monthly

  Breach Consequences - Even if a company is 100% PCI compliant and validated, a breach in cardholder data may still
  occur. Cardholder Breaches can result in the following losses for a merchant.

  •    $50-$90 fine per cardholder data compromised

  •    Suspension of credit card acceptance by a merchant’s credit card account provider

  •    Loss of reputation with customers, suppliers, and partners

  •    Possible civil litigation from breached customers

  •    Loss of customer trust which effects future sales

  State penalties vary. For example, the Minnesota statute allows financial institutions to sue merchants in certain
  instances where data is stolen from the merchant.

  Importance to contact centers

  Deploy call recording solutions that are compliant with PCI – DSS requirements:

  •    Assure that access to encrypted confidential information requires multifactor authentication. This means individuals
       seeking access to that data must provide more than one proof that they are who they claim to be.
  •    Replace or upgrade any recording software that does not mask or otherwise prevent the display of sensitive
       authentication data on agent screens after authorization.
  •    For maximum protection, it is prudent to invest in recording solutions that provide End-to-end multimedia encryption
       – where data is encrypted at the point of capture and remains encrypted throughout its lifetime.
  •    Assure that your recording software does not store Sensitive Authentication Data such as CID numbers.

  Supervisors should monitor their teams to assure that card numbers, expiration dates, and other private card information is
  not carelessly jotted down on notepads or repeated out loud for others to hear.
  If your organization deploys a voice and data recording system for the call centers it would be advisable to extend that
  application to all functions within the enterprise where credit or debit card payment may occur. Coordinate actions with your
  compliance officer. Recording requirements are just one small part of a much broader list of requirements.

11 | Copyright © 2018 NICE Ltd. All rights reserved
General Data Protection Regulation
  GDPR

  Background
  For member states of the European Union the General Data Protection Regulation (GDPR), replaces the prior Data Protection
  Directive. The GDPR is directly applicable in each member state and will lead to data protection harmonization across EU
  nations. Although many companies have already adopted privacy processes and procedures consistent with the Directive,
  the GDPR contains several new protections for EU data subjects and threatens significant fines and penalties for non-
  compliant data controllers and processors once it comes into force.

  May 25th, 2018 is the effective date for GDPR implementation. With new obligations on such matters as data subject
  consent, data anonymization, breach notification, trans-border data transfers, and appointment of data protection officers, to
  name a few, the GDPR requires companies handling EU citizens’ data to undertake major operational reform. The General
  Data Protection Regulation also addresses export of personal data outside the EU.

  Objectives
  •    To give people more control over their personal data.

  •    To consolidate the different regulations, laws, and guidelines across European Union member states into a single, central
       source.

  •    To streamline and create a clearer legal environment which will hopefully improve business opportunities and lessen
       ambiguity with data sharing.

  Terms
  Personal data means any information relating to an identified or identifiable natural person (‘data subject’); An identifiable
  natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name,
  an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological,
  genetic, mental, economic, cultural, or social identity of that natural person.”

  This basically covers anything from a name, a photo, an email address, bank details, social media posts, medical information,
  or even computer’s IP address

  A controller is the entity that determines the purposes, conditions and means of the processing of personal data.

  The processor is an entity which processes personal data on behalf of the controller.

  Scope
  The GDPR applies to all companies processing the personal data of data subjects residing in the European Union, regardless
  of the company’s location. If an organization employs fewer than 250 persons there is a clause that allows for exemption
  from the GDPR. The GDPR will also apply to the processing of personal data of data subjects in the EU by a controller or
  processor not established in the EU, where the activities relate to: offering goods or services to EU citizens (irrespective of
  whether payment is required) and the monitoring of behavior that takes place within the EU. Non-EU businesses processing
  the data of EU citizens will also have to appoint a representative in the EU.

12 | Copyright © 2018 NICE Ltd. All rights reserved
GDPR

  Pertinent Provisions
  In the European Union consumers will have to volunteer to share their information by providing “clear and affirmative
  consent” to the processing of their confidential information. The GDPR adds that consent must be specific to each data
  processing operation. To meet the specificity requirement under Article 7, a request for consent to data processing must be
  “clearly distinguishable” from any other matters in a written document, and it must be provided “in an intelligible and easily
  accessible form, using clear and plain language.”

  The data subject may consent by “choosing technical settings for information society services.” Article 9 requires “explicit”
  consent for the processing of “special categories of personal data.” This includes data “revealing racial or ethnic origin,
  political opinions, religious or philosophical beliefs, or trade-union membership, and the processing of genetic data,
  biometric data for the purpose uniquely identifying a natural person, data concerning health or data concerning a
  natural person’s sex life or sexual orientation.”

  Breach notification will become mandatory in all member states where a data breach is likely to “result in a risk for the rights
  and freedoms of individuals”. This must be done within 72 hours of first having become aware of the breach. Data processors
  will also be required to notify their customers, the controllers, “without undue delay” after first becoming aware of a data
  breach.

  Further, the controller shall provide a copy of the personal data, free of charge, in an electronic format. Also known as Data
  Erasure, the right to be forgotten entitles the data subject to have the data controller erase his/her personal data, cease
  further dissemination of the data, and potentially have third parties halt processing of the data. Data subjects have the right to
  receive the personal data concerning them, which they have previously provided in a ‘commonly use and machine-readable
  format,’ and have the right to transmit that data to another controller.

  “Privacy by design” is a concept that is becoming part of a legal requirement with the GDPR. It calls for the inclusion of data
  protection from the onset of the designing of systems. The controller shall implement appropriate technical and organizational
  measures to meet the requirements of this Regulation and protect the rights of data subjects. The expanded definition of
  personal information impacts businesses that specialize in analytics, advertising, and social media. This is because the
  definition of personal data now includes “location data” and “an online identifier”.

  The GDPR allows for data transfers to countries whose legal regime is deemed by the European Commission to provide for
  an “adequate” level of personal data protection. In the absence of an adequacy decision, however, transfers are also allowed
  outside non-EU states under certain circumstances, such as by use of standard contractual clauses or binding corporate
  rules.

  Penalties
  Below is a very high-level breakdown of the GDPR sanctions that may apply:

  •    A warning in writing in cases of first and non-intentional non-compliance

  •    A fine up to 20 million EUR or up to 4% of the annual worldwide turnover of the preceding fiscal year in case of an
       enterprise, whichever is greater

13 | Copyright © 2018 NICE Ltd. All rights reserved
GDPR

  Importance to Contact Centers
  Personal data is defined very broadly to include any information “relating to an identified or identifiable natural person.” This
  includes telephone numbers. Since most CRM systems present customer information based on incoming phone numbers it
  is essential to obtain “clear and affirmative consent” to capture and store phone numbers and related customer metadata that
  is accessible by agents and others. There will be some individuals who will not consent to sharing personal information with
  businesses. The recording software should be able to block the capture and storage of caller phone number, email address,
  twitter handle, or other identifiable personal information Article 9 requires “explicit” consent for the processing of biometric
  data. This would include voiceprint technology. Contact centers that adopt this technology should implement some durable
  means of recording and storing explicit consent.

  Individuals have the right to receive personal data that they had previously provided “in machine-readable format. “This would
  clearly include recorded interactions. Businesses subject to GDPR need to assess how this would be managed.

  US-based businesses are subject to GDPR if they process personal data of consumers within the European Union. It does
  not matter where the contact center is located.

14 | Copyright © 2018 NICE Ltd. All rights reserved
Markets in Financial Instruments
  Directive II
  MiFID II
  Background
  MiFID II represents a major overhaul of the existing law, building on and extending the scope of the first Markets in Financial
  Instruments Directive, which originally came into force in November 2007. MiFID II became effective on January 3, 2018. It
  will create a more equal regulatory playing field across the EU for investment firms by harmonizing several areas that were
  previously regulated by individual EU Member States. The directive is administered by the European Commission and applies
  to all member states of the European Union. The European Securities and Markets Authority (ESMA), alongside the European
  Commission, is responsible for developing technical standards to implement legislation.

  MiFID II requires that anyone involved in giving financial service and/or advice that leads to, or may lead to, a transaction,
  must record their conversation – including mobile – and securely store these records. Financial service providers are expected
  to retain, capture and maintain all communication between sellers, buyers and investment mediators. Records will have to be
  kept for a minimum of 5 years. All records should be available and cannot be modified nor deleted. All records should be kept
  even if they have not lead to a transaction. According to the Boston Consulting Group, preparing for implementation could
  cost firms $2bn during 2017 alone.

  Objectives
  •    To make European markets safer, more transparent and more efficient.

  •    To restore investor confidence following the financial crisis.

  •    To move a significant part of over-the-counter trading onto regulated trading venues.

  •    To increase competition across financial markets

  •    To align regulation across the European Union in certain areas

  •    To serve as a cornerstone of European Union efforts to create a single financial market that could rival the US capital
       markets

  Scope
  The directive applies to firms engaged in the marketing of financial instruments that are listed on European Union based
  exchanges. More specifically, this applies to banks, fund managers, exchanges, trading venues, high-frequency traders,
  brokers, pension funds, hedge funds and retail investors. Currently the United Kingdom is a member of the European Union
  and a signatory to MiFID II. If a US-based firm conducts business with banks located in the European Union they also must
  comply with European regulations (such as MiFID II). On top of the broader regulations, different countries also have their
  own retention requirements, and this further adds to the complexity. US fund managers must pay attention to MiFID II if they
  have clients in EU, and if they have a manager or distributor affiliates in the EU and to the extent they trade in EU markets.

15 | Copyright © 2018 NICE Ltd. All rights reserved
MiFID II

  Important provisions
  MiFID II requires firms to keep records of telephone calls and other electronic communications when the firms deal on their
  own account or receive and transmit and/or execute client orders. The obligation also extends to calls and emails where
  a transaction is intended to take place but does not actually occur. The obligation extends to calls and emails involving
  equipment provided to, or authorized for the use of, employees and contractors of the firm.

  Firms must inform new and existing clients that telephone calls which will (or may) result in transactions will be recorded. This
  notification may be made once, before investment services are provided to the client. Firms must take all reasonable steps to
  prevent employees or contractors from receiving client orders via their own cell phones or other electronic devices that are not
  recorded by the firm.

  The records must be kept for five years but, if requested by an NCA, may be kept for up to seven years. They should be
  made available to clients on request. Firms should have a policy on the recording of telephone conversations and electronic
  communications which should identify which conversations and communications are in scope. The records must be kept in a
  medium that facilitates access by a national competent authority (“NCA”).

  The firm should comply on a “technology- neutral” basis, so that its procedures can be updated to reflect the use of
  innovative technologies. Firms should periodically monitor their records to ensure compliance Records of telephone
  conversations and email communication should be in a durable medium which prevents the record from being manipulated
  or altered. The recording requirement also applies to entities authorized under other EU legislation, specifically investment
  banks, private banks, asset managers, custodial services providers, retail banks, broker-dealers, financial advisers and
  market infrastructure providers. It will apply to all firms that fall within the current MiFID, as well as some that are affected by
  expansion of the scope of MiFID.

  Penalties
  Penalties are set by the regulatory agencies in each country. The UK agency, Financial Conduct Authority, has charged a
  £1.50 fine per line of incorrect or non- reported data. If one considers that every day, millions of transactions are reported by
  hundreds of trading venues, for thousands of different financial instruments, the potential for individual company fines of tens
  of millions of dollars is very real. Also consider that more transactions will be subject to regulation under MiFID II than in the
  past under MiFID, and potential fines are even larger than in the past.

16 | Copyright © 2018 NICE Ltd. All rights reserved
MiFID II

  What Contact Centers can do
  All incoming calls from clients or trading Associates should be automatically answered with a message that the call may be
  recorded. Outbound calls from sales reps and others seeking to sell financial instruments should be trained to advise that the
  call may be recorded in compliance with MiFID regulations.

  Recording platforms must be upgraded or replaced to have at least the following capabilities:

  •    Capture both voice and electronic communications

  •    Easily searchable

  •    Extensible so all departments or individuals that promote, sell, or execute financial instruments

  •    Must be built on a flexible architecture that accommodates changes.

  •    Sufficient to capture and store vast volumes of communications and transactions.

  •    Capable of recording voice and data conversations originating from mobile devices which are the property of trading
       companies or their suppliers.

  •    End-to-end multimedia encryption capability

  Regularly monitor stored interactions to assure that the notification about recording is accurately recited and help assure that
  the privacy provisions of GDPR are observed. Establish and maintain controls to assure that recordings are stored for at least
  five years in a durable medium.

17 | Copyright © 2018 NICE Ltd. All rights reserved
Health Insurance Portability and
  Accountability Act (HIPAA)
  – Privacy Rule -
  Background
  The U.S. Department of Health and Human Services (“HHS”) issued the Privacy Rule to implement requirements of the
  Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). Under HIPAA, healthcare companies must comply
  with extensive rules and regulations regarding the dissemination and transmittal of personal patient information. The Privacy
  Rule standards address the use and disclosure of individuals’ health information—called “protected health information” by
  organizations subject to the Privacy Rule — called “covered entities,” as well as standards for individuals’ privacy rights to
  understand and control how their health information is used.

  The Office for Civil Rights within the Department of Health and Human Services has responsibility for implementing and
  enforcing the Privacy Rule with respect to voluntary compliance activities and civil money penalties. The HIPAA Privacy
  Rule regulates the use and disclosure of protected health information (PHI) held by “covered entities” (generally, health care
  clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain
  transactions).

  Objective
  Assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide
  and promote high quality health care and to protect the public’s health and well-being.

  Terms
  Protected Health Information (PHI). The Privacy Rule protects all “individually identifiable health information” held or
  transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy
  Rule calls this information “protected health information. Individually identifiable health information includes:

  •    The individual’s past, present or future physical or mental health or condition,

  •    The provision of health care to the individual, or

  •    The past, present, or future payment for the provision of health care to the individual,

  •    And that identifies the individual for which there is a reasonable basis to believe it can be used to identify the individual.
       Individually identifiable health information includes many common identifiers (e.g., name, address, birth date, Social
       Security Number).

  The Privacy Rule excludes from protected health information employment records that a covered entity maintains in its
  capacity as an employer and education and certain other records subject to, or defined in, the Family Educational Rights and
  Privacy Act, 20 U.S.C. §1232g.

  Business Associate In general, a business associate is a person or organization, other than a member of a covered entity’s
  workforce, that performs certain functions or activities on behalf of, or provides certain services to, a covered entity that
  involve the use or disclosure of individually identifiable health information.

  Business Associate Contract. When a covered entity uses a contractor or other non- workforce member to perform
  “business associate” services or activities, the Rule requires that the covered entity include certain protections for the
  information in a business associate agreement. In the business associate contract, a covered entity must impose specified
  written safeguards on the individually identifiable health information used or disclosed by its business associates.

18 | Copyright © 2018 NICE Ltd. All rights reserved
HIPAA

  Scope
  The Privacy Rule, as well as all the Administrative Simplification rules, apply to health plans, health care clearinghouses, and
  to any health care provider who transmits health information in electronic form in connection with transactions for which the
  Secretary of HHS has adopted standards under HIPAA (the “covered entities”). There are exceptions—a group health plan
  with less than 50 participants that is administered solely by the employer that established and maintains the plan is not a
  covered entity.

  Health Plans. Individual and group plans that provide or pay the cost of medical care are covered entities.4 Health plans
  include health, dental, vision, and prescription drug insurers, health maintenance organizations (“HMOs”), Medicare, Medicaid,
  Medicare+Choice and Medicare supplement insurers, and long-term care insurers (excluding nursing home fixed-indemnity
  policies).

  Health Care Providers. Every health care provider, regardless of size, who electronically transmits health information in
  connection with certain transactions, is a covered entity. These transactions include claims, benefit eligibility inquiries, referral
  authorization requests, or other transactions for which HHS has established standards under the HIPAA Transactions Rule.6
  Using electronic technology, such as email, does not mean a health care provider is a covered entity; the transmission must
  be in connection with a standard transaction.

  Health Care Clearinghouses. These are entities that process nonstandard information they receive from another entity into
  a standard (i.e., standard format or data content), or vice versa. In most instances, health care clearinghouses will receive
  individually identifiable health information only when they are providing these processing services to a health plan or health
  care provider as a business associate. In such instances, only certain provisions of the Privacy Rule are applicable to the
  health care clearinghouse’s uses and disclosures of protected health information.8 Health care clearinghouses include billing
  services, repricing companies, community health management information systems, and value-added networks and switches
  if these entities perform clearinghouse functions.

  Pertinent provisions
  A covered entity may not use or disclose protected health information, except either: (1) as the Privacy Rule permits or
  requires; or (2) as the individual who is the subject of the information (or the individual’s personal representative) authorizes
  in writing. Under HIPAA rules and regulations, call centers need to incorporate secure voice and data processing as well as
  encrypted data record storage to enhance call monitoring, tracking, data management and reporting.

  Call centers must now ensure that all CSRs are appropriately trained to protect the confidentiality of patient’s medical records
  and payment histories. HIPAA-compliant call centers must ensure that recording and monitoring platforms integrate screen
  and voice data to protect confidential patient information without compromising the training and evaluation of its CSRs’
  performances.

  A covered entity must disclose protected health information in only two situations: (a) to individuals (or their personal
  representatives) specifically when they request access to, or an accounting of disclosures of, their protected health
  information; and (b) to HHS when it is undertaking a compliance investigation or review or enforcement action. A covered
  entity must obtain the individual’s written authorization for any use or disclosure of protected health information that is not for
  treatment, payment or health care operations or otherwise permitted or required by the Privacy Rule. A covered entity may
  not condition treatment, payment, enrollment, or benefits eligibility on an individual granting an authorization, except in limited
  circumstances

19 | Copyright © 2018 NICE Ltd. All rights reserved
HIPAA

  Patients have the right to decide how their health care information is used. Therefore, a patient must sign a release of
  information before it can be shared outside of the doctor-patient setting. Once the health care professional has information
  from a patient, they are required to follow certain guidelines to protect it. Wrongful disclosure or misuse of medical information
  is prohibited and could subject a medical professional to fines and/or imprisonment.

  Penalties
  Penalties for HIPAA violations can be issued by the Department of Health and Human Services’ Office for Civil Rights and
  state attorneys general. In addition to financial penalties, covered entities are required to adopt a corrective action plan to
  bring policies and procedures up to the standards demanded by HIPAA.

  The four categories used for the penalty structure are as follows:

  Category 1: A violation that the covered entity was unaware of and could not have realistically avoided, had a reasonable
  amount of care had been taken to abide by HIPAA Rules

  Category 2: A violation that the covered entity should have been aware of but could not have avoided even with a reasonable
  amount of care. (but falling short of willful neglect of HIPAA Rules)

  Category 3: A violation suffered as a direct result of “willful neglect” of HIPAA Rules, in cases where an attempt has been
  made to correct the violation

  Category 4: A violation of HIPAA Rules constituting willful neglect, where no attempt has been made to correct the violation

  Category 1: Minimum fine of $100 per violation up to $50,000

  Category 2: Minimum fine of $1,000 per violation up to $50,000

  Category 3: Minimum fine of $10,000 per violation up to $50,000

  Category 4: Minimum fine of $50,000 per violation

  The maximum fine per violation category, per year, is $1,500,000.

  In addition to civil financial penalties for HIPAA violations, criminal charges can be filed against the individual(s) responsible for
  a breach of PHI.

20 | Copyright © 2018 NICE Ltd. All rights reserved
HIPAA

  Importance to Contact Centers
  In house contact centers for covered entities (e.g., providers, insurers, etc.) and business associates (collectors, outsourcers,
  billing companies, etc.) should have strict controls over customer data bases. Non-authorized personnel should not have
  access to information about the health condition of specific individuals. Healthcare organizations should avoid engaging
  the services of a third-party call center unless it can be independently verified the call center is communicating ePHI in
  compliance with HIPAA. Service provider contact centers and business associates that are HIPAA compliant should require
  their employees to attend training seminars and to stay up-to-date with any changes to the regulations.

  Encrypt all PHI: Encrypting PHI essentially devalues it to hackers because it renders the data completely unusable without a
  key to unlock it. Encryption is not required by HIPAA but is considered a best practice that all healthcare organizations should
  enforce. Avoid recording sensitive information: One of the easiest ways to prevent a theft of data is to not record PHI over the
  phone in the first place. Set a policy requiring agents to turn off call recording when collecting payment information over the
  phone to avoid storing it in your database. A more reliable method is to upgrade or replace recording software that does not
  mask or pause the entry of sensitive data. HIPAA-compliant call centers must ensure that recording and monitoring platforms
  integrate screen and voice data to protect confidential patient information without compromising the training and evaluation of
  its CSRs’ performances

21 | Copyright © 2018 NICE Ltd. All rights reserved
Telemarketing Sales Rule
  TSR

  Background
  Enacted by Congress in 1994, the Telemarketing and Consumer Fraud and Abuse Prevention Act directed the Federal
  Trade Commission (FTC) to issue a rule defining and prohibiting deceptive and abusive telemarketing acts or practices. The
  original Telemarketing Sales Rule (TSR) was enacted in 1995 and has been amended several times; in 2003 to establish the
  Do-Not-Call registry, in 2008 to address prerecorded messages in telemarketing calls, in 2010 to address deceptive and
  abusive practices associated with debt relief services, and in 2015 to prohibit the use of remotely created payment orders and
  checks, cash-to-cash money transfers, and cash reload mechanisms.

  The TSR requires telemarketers to make certain disclosures to consumers and prohibits material misrepresentations. In
  addition to the federal Telemarketing Sales Rule individual states may have their own requirements for telemarketing

  Intent
  The Consumer Fraud and Abuse Prevention Act (‘‘Telemarketing Act’’) targets deceptive or abusive telemarketing practices,
  by issuing a rule that prohibits deceptive and abusive telemarketing practices.

  Terms
  •    Telemarketing is a plan, program, or campaign to induce the purchase of goods or services or charitable contribution
       involving more than one interstate call.

  •    Material Information is information that would likely affect a person’s choice of goods or services or the person’s
       decision to make a material contribution.

  •    Clear and Conspicuous - When disclosures are oral, “clear and conspicuous” means at an understandable speed
       and pace, and in the same language(s)and in the same tone and volume as the sales offer(s) so that ordinary consumers
       can easily hear and understand it. When making outbound calls, a telemarketer must promptly disclose certain types of
       information to consumers orally in the sales presentation.

  •    Express Verifiable Authorization is required when payment is made by methods other than a credit card, debit card,
       money order, or mailed checks. Authorization is considered verifiable if it is stored as an audio recording.

22 | Copyright © 2018 NICE Ltd. All rights reserved
TSR

  Scope
  The TSR applies to any firm or individual, foreign or domestic, that engages in interstate telemarketing (as defined) unless
  specifically excluded. These include:

  •    Telefunders: third-party telemarketing firms that are engaged by nonprofits for fundraising.

  •    Third-party telemarketing organizations retained by organizations that would’ve otherwise been exempt if they were
       conducting their own telemarketing

  •    Insurance related businesses to the extent that telemarketing activities of such businesses are not regulated by state law.

  Attempts to upsell a customer who was not been calling in response to a solicitation; for example, the request for a service
  connection. Up selling is subject to the TSR even if the initial call was exempt, such as response to media advertising.

  Exemptions include banks and federal credit unions, common carriers, security dealers and related financial service
  organizations - all of which are covered by separate legislation. Also exempted are unsolicited calls from consumers, calls
  placed in response to a catalog or general media advertising, and most business to business calls.

  Pertinent provisions
  The TSR requires that a telemarketer making an outbound sales call must promptly, truthfully, clearly and conspicuously
  disclose the following before any sales proposal is given:

  •    The identity of the seller

  •    That the purpose of the call is to sell goods or services

  •    The nature of the goods or services being offered

  •    In the case of a prize promotion that no purchase or payment is necessary to participate

  Disclosures are not required when a seller makes calls to welcome new customers and asks whether they are satisfied with
  goods or services they recently purchased. If the seller doesn’t plan to sell anything to these customers during any of these
  calls, the four oral disclosures are not required.

  If the called party wishes to proceed with an order the seller or telemarketer must disclose the following material information
  before the customer pays for the goods or services:

  •    Cost and quantity- including any detail such as shipping cost and terms of installment agreement.

  •    Any material limitations or restrictions - such as policies for refunds, cancellations, and exchanges.

  •    In the case of an offer of a credit card any requirement to make a deposit must be disclosed.

  Oral disclosures must be” clear and conspicuous” and must be revealed before the consumer pays. The TSR prohibits
  sellers and telemarketers from making false or misleading statements to induce anyone to pay for goods or services or make
  a charitable contribution. The TSR requires “express verifiable authorization” when the payment is made by methods other
  than a credit card, debit card, conventional checks, postal money order, cash, gift certificates, or direct billing. Among other
  methods, authorization is considered verifiable if the seller obtains and audio recording of customer consent.

23 | Copyright © 2018 NICE Ltd. All rights reserved
TSR

  When the seller is using pre-acquired account information to execute payment, they must obtain from the customer at least
  the last four digits of the account number to be charged. Any audio recording of an oral authorization payment must clearly
  demonstrate that the consumer has received each of eight specific pieces of information about the transaction and that the
  consumer has authorized that funds be taken from (or charged to) his or her account based on the required disclosures by
  the seller or telemarketer:

  •    The goods and services being purchased, or the charitable contribution for which payment authorization is sought.

  •    The number of debits, charges, or payments (if more than one).

  •    The date the debits, charges, or payments will be submitted for payment.

  •    The amount of the debits, charges, or payments.

  •    The customer or donor’s name.

  •    The customer or donor’s billing information, identified in specific enough terms that the consumer understands which
       account will be used to collect payment for the transaction.

  •    A telephone number that is answered during normal business hours by someone who can answer the consumer’s
       questions.

  •    The date of the consumer’s oral authorization

  For audio recordings for transactions where sellers and telemarketers have pre-acquired account information and are offering
  goods or services on a free-to-pay conversion basis, the entire telemarketing transaction must be recorded on audio. Also,
  the audio recording must capture the material terms provided to the consumer, as well as the context and way the offer is
  presented. In a single-transaction call, this means taping the entire call; in a multi-purpose call it means recording the entirety
  of each transaction using pre-acquired account information coupled with a free-to-pay conversion offer. In a multi-purpose
  call, it means recording the entirety of each transaction using pre-acquired account information coupled with a free-to-pay
  conversion offer.

  When pre-acquired account information is used but the offer does not include a free-to-pay conversion feature, the seller
  must:

  •    Obtain the customer or donor’s express agreement to be charged for the goods or services and to be charged using the
       account number the seller or telemarketer has identified.

  •    At a minimum, sellers and telemarketers must identify the account to be charged with enough specificity for the customer
       or donor to understand.

  The TSR also requires that the audio recording of the oral authorization must be made available upon request to the customer
  or donor, as well as to the customer or donor’s bank or other billing entity.

  The following records must be maintained for two years from the date that the record is produced:

  •    Advertising and promotional materials

  •    Information about prize recipients

  •    Sales records

  •    Employee records

  •    All verifiable authorizations or records of express informed consent or express agreement.

24 | Copyright © 2018 NICE Ltd. All rights reserved
TSR

  If authorization is by audio recording, a copy of the recording must be maintained. While the recording may be retained
  in any format, it must include all the information that must be disclosed to the consumer, as well as the consumer’s oral
  authorization. Sellers and telemarketers may maintain the records in any manner, format or place that you keep such records
  in the ordinary course of business, including in electronic storage.

  Billing information in specific enough terms that the consumer understands what account will be used to collect payment for
  the transaction. For example, reciting the account and amount to be charged on a specific date. Also, most states have more
  general consumer protection statutes which govern all consumer transactions with residents of those states. Those consumer
  protection laws prohibit a variety of fraudulent and unfair trade practices. Some states require telemarketers to apply for and
  obtain a state telemarketing license or telemarketing bond before they can call into or out of their state.

  Penalties
  Companies that violate the Rule are subject to fines of up to $11,000 per violation. There are more severe penalties for
  violations of the Do-Not-Call Provisions. State attorneys general or any other officer authorized by the state to bring actions
  on behalf of its residents may bring actions by the states. Private citizens may bring an action to enforce the TSR if they have
  suffered $50,000 or more in actual damages.

  Importance to Contact Centers
  Contact centers should record all voice and screen interactions that involve actual telephone sales or sales attempts.
  The TSR applies to all individuals that use the telephone for making sales propositions. Organizations should extend
  compliance training, appropriate scripting, and interaction recording to all employees who use the telephone for making sales
  propositions. This would include sales representatives as well as telemarketers and customer service representatives tasked
  with revenue generation.

  All interaction recordings must be easily searchable using available metadata. This is to help settle disputes and to comply
  with customer requests for copies of the recording. To prevent errors and help assure compliance, telemarketers and other
  sellers should be provided with precise scripts which provide mandated details. Contact centers engaged in telemarketing
  should check if the states in which they operate require licenses or bonds.

  When retaining third-party call centers, it is incumbent upon the client to assure that the outsourcer complies with TSR
  requirements. It is a violation of the TSR to substantially assist a seller or telemarketer while knowing — or consciously
  avoiding knowing — that the seller or telemarketer is violating the TSR. Many telemarketers operate from their home offices.
  Employers should assure that these calls are recorded and secured from unauthorized access.

25 | Copyright © 2018 NICE Ltd. All rights reserved
You can also read