- BPO security
Information security has emerged as a significant concern for banks, mobile phone companies and other businesses that use
call center s orbusiness process outsourcing .Theft of personal data has been reported from both US-based [ [http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,101903,00.html Scope of bank data theft grows to 676,000 customers ] ] and India-based [ [http://news.bbc.co.uk/1/hi/uk/4121934.stm BBC NEWS | UK | Indian call centre 'fraud' probe ] ] call centers. In one case, one of the alleged criminals has stated that the data he offered for sale was fake. [ [http://www.rediff.com/money/2006/oct/02bpo.htm Help us fixing corrupt BPO staff, says Nasscom ] ] ,
Britain's Financial Service Authority examined standards in India in April 2005 and the Banking Code Standards Board audited eight Indian call centres in 2006, handling more than a million calls per month from the UK.The BCSB report stated that "Customer data is subject to the same level of security as in the UK. High risk and more complex processes are subject to higher levels of scrutiny than similar activities onshore." [ [http://www.rediff.com/money/2006/oct/07bpo.htm Outsourcing thriving in Britain despite India bash ] ]
India's
NASSCOM has said that they take breach in security extremely seriously and will assist the police in their probe.Common countermeasures
There are three identifiable types of illicit activities concerning fraud emanating from call centers:
*1. Crooks who pretend to be legitimate call centres.
*2. Hackers who gain access to call centre information through illegal means
*3. Call centre agents who illegally misuse the information they have access to in call centres.While items 1 and 2 are mostly subject to police action, call centres can use internal procedures to minimise risk. Such mitigation measures include but are not limited to:
*1. Creating a paperless environment, preventing employees from writing down and removing information by ensuring that all work processes are done on the computer, without having to record anything on forms or notes.
*2. Prohibiting the use of cellphones and cameras on the floor.
*3. Prohibiting paper, pens and digital recording devices from being brought onto the floor.
*4. Preventing internet access for employees on the floor.
*5. Limiting functionality and access of personal computers or terminals used by call center agents (for example, disabling USB ports). Companies may also use data loss prevention software to block attempts to download, copy, or transmit sensitive electronic data. [ [http://www.csoonline.com/article/356064 Call Center Security How: to Protect Employees and Customers] ]ee also
*
Globalization
*Business process outsourcing in India References
External links
* [http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,101903,00.html Scope of NJ bank data theft grows to 676,000 customers]
* [http://www.rediff.com/money/2005/nov/03bpo.htm BPO: In India data security cost skyrockets]
* [http://www.thesun.co.uk/article/0,,2-2005280724,,00.html Your life for sale]
* [http://news.bbc.co.uk/1/hi/uk/4121934.stm Indian call centre 'fraud' probe]
* [http://www.theregister.co.uk/2005/04/13/india_call_staff/ India acts on call centre fraud]
* [http://www.csoonline.com/article/218680 Offshore Outsourcing: Big Savings, Big Risk]
Wikimedia Foundation. 2010.