Podcast
Questions and Answers
What type of information is considered Personal Information?
What type of information is considered Personal Information?
- Date of birth (correct)
- Username
- Phone number
- IP address
Which action is part of the solution to handling suspicious chats?
Which action is part of the solution to handling suspicious chats?
- Encouraging the agent to back read the full conversation (correct)
- Requesting the user's social media passwords
- Asking the user for their bank account details
- Encouraging the agent to share personal information
What should agents proactively do regarding suspicious chats?
What should agents proactively do regarding suspicious chats?
- Report them to QA Team (correct)
- Ask users to provide more Personal Information
- Encourage sharing personal photos
- Ignore them
Which of the following actions is not recommended when handling Personal Information?
Which of the following actions is not recommended when handling Personal Information?
What should be done if suspicious chats are identified?
What should be done if suspicious chats are identified?
What is the key purpose of implementing the Zero Tolerance Policy (ZTP) mentioned in the text?
What is the key purpose of implementing the Zero Tolerance Policy (ZTP) mentioned in the text?
What could happen to employees who violate the Zero Tolerance Policy?
What could happen to employees who violate the Zero Tolerance Policy?
What is one thing that employees are strictly forbidden from doing under the Zero Tolerance Policy?
What is one thing that employees are strictly forbidden from doing under the Zero Tolerance Policy?
What is the consequence of coercing benefits while interacting with customers or alternate platforms under the Zero Tolerance Policy?
What is the consequence of coercing benefits while interacting with customers or alternate platforms under the Zero Tolerance Policy?
What could happen if an employee is found seeking and obtaining user’s personal information proactively for personal gain or interest?
What could happen if an employee is found seeking and obtaining user’s personal information proactively for personal gain or interest?