Compliance Locator

A key success factor to achieving and maintaining PCI DSS compliance in your contact centres is to understand your starting point but often, it’s difficult to see the wood for the trees.

You need an accurate view of how technology interfaces with people and process, as well as a firm grasp of personal data legislation, contact centre operations and how to deliver exceptional customer experiences. And then of course, there’s a requirement for best-in-breed technology solutions – not to mention robust, tried and tested methodologies.

We will help you understand where you are on the compliance journey and what needs to be done to achieve and maintain compliant contact centres as quickly, easily and cost-effectively as possible.

Our highly experienced experts will map your organisation’s data journey, data environment, compliance position, information security provisions and any other project dependencies. We’ll also look at the appropriateness of your external partner and supplier relationships, and identify important dependencies.

At the end of this process, we’ll present back a high level report of where you are and indicative budgets for what needs to be done.

When we understand your organisation’s starting point, we’ll be in the best possible place to get you to a compliant state quickly and cost-effectively, by following our unique Prepare, Provision, Proceed, Manage methodology

Compliance Locator: Key Features

    • Available in ‘full’ and ‘lite’ deployment modules for payment and personal data (PCI DSS & PII) to support scale and budget requirements
    • Agile implementation methodology using a combination of online questionnaire, workshops, individual meetings and site visits
    •  ‘Lite’ outputs provide a risk assessment, highlights critical dependencies and threats and documents potential outcomes. The review provides and analysis against common delivery baselines to identify future work streams and outline resource requirements. Indicative budgets to support an outline business case are also provided
    •  ‘Full’ outputs extend to identify more detailed risks, threats and critical dependencies leading to a more accurate assessment of potential outcomes, outline budget requirements and potential outcomes