Email Queues Clause Samples

Email Queues. Email queues enable the efficient management of email to and from Cloud Voice Contact. Emails will appear on the queue and agents that are within groups that serve that queue will be able to select emails to work in. Participation on email queues can be set at an agent level, so for example an agent might be part of a Group that is attached to an email queue, but they could be set to work on voice exclusively. Each queue can be associated with a different email server and/or email account and can therefore be associated with a different email flow. A list of classifications can be assigned to emails and these will be recorded against the call notes and can be reported against using the built in Reports tool. The administrator can select which classifications are enabled for email as with other channels. A timer can be set for emails on a queue. This measures the time that it takes the agent to reply to the email, once they have initiated the response. This time can be set by the administrator and the opportunity to allow and extension can also be configured.

Related to Email Queues

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.