Email Queues Sample Clauses

Email Queues. Email queues enable the efficient management of email to and from Cloud Voice Contact. Emails will appear on the queue and agents that are within groups that serve that queue will be able to select emails to work in. Participation on email queues can be set at an agent level, so for example an agent might be part of a Group that is attached to an email queue, but they could be set to work on voice exclusively. Each queue can be associated with a different email server and/or email account and can therefore be associated with a different email flow. A list of classifications can be assigned to emails and these will be recorded against the call notes and can be reported against using the built in Reports tool. The administrator can select which classifications are enabled for email as with other channels. A timer can be set for emails on a queue. This measures the time that it takes the agent to reply to the email, once they have initiated the response. This time can be set by the administrator and the opportunity to allow and extension can also be configured.
AutoNDA by SimpleDocs

Related to Email Queues

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

  • Service Information Pages Verizon shall include all CBB NXX codes associated with the geographic areas to which each directory pertains, to the extent it does so for Verizon’s own NXX codes, in any lists of such codes that are contained in the general reference portion of each directory. CBB’s NXX codes shall appear in such lists in the same manner as Verizon’s NXX information. In addition, when CBB is authorized to, and is offering, local service to Customers located within the geographic area covered by a specific directory, at CBB’s request, Verizon shall include, at no charge, in the “Customer Guide” or comparable section of the applicable alphabetical directories, CBB’s critical contact information for CBB’s installation, repair and Customer service, as provided by CBB. Such critical contact information shall appear alphabetically by local exchange carrier and in accordance with Verizon’s generally applicable policies. CBB shall be responsible for providing the necessary information to Verizon by the applicable close date for each affected directory.

  • WHOIS query RTT Refers to the RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the WHOIS response. If the RTT is 5-­‐times or more the corresponding SLR, the RTT will be considered undefined.

  • Contact Information In the event of an emergency involving your electric service (e.g. an outage or downed power lines) you should call the emergency line for your DSP. The Ameren Illinois emergency phone number is: (000) 000-0000. In all other situations, you may contact Homefield Energy toll free at (000) 000-0000 or by e-mail at XxxxxxxxxXxxxXxxx@XxxxxxXxxx.xxx; or via mail at Homefield Energy, Attn: Customer Service, P.O. Xxx 000000, Xxxxxx, Xxxxx 00000.

  • pdf The vendor must download the Vendor Agreement from the attachment tab, fill in the requested information and upload the completed agreement. DO NOT UPLOAD encrypted or password protected files. The vendor must download the PRICING SPREADSHEET SHEET from the attachment tab, fill in the requested information and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files. Supplementary information may be scanned and uploaded. (Company information, brochures, catalogs, etc.) (PDF Format ONLY) DO NOT UPLOAD encrypted or password protected files.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!