what is the call flow
greeting
empathy
acknowledgement
verification
assistance
offer additional assistance
closing
What card begins with a 4?
visa
ICE
I- Identify the red flags that will likely indicate that you are dealing with a suspicious caller
C- Collaborate with Supervisor if unsure review the account with your leadership for guidance and a second look.
E- Escalate to the TMS first party fraud team for a deeper dive and resolution
Remember to C.A.R.E
who wrote to kill a mockingbird?
harper lee
Angry customer how do you deal with them
a-apologize
s- sympathize and empathize
a- accept responsibility
p- prepare to help
What card begins with a 5?
Mastercard
What are red flags for fraud app?
What is logical security?
Consists of software safeguards for and organization's systems, including user identification and password access, authentication, access rights and authority levels
who played the new mufasa?
aaron pierre
what is active listening
when speaking with a customer is to ensure that his/her needs are all met without needing to repeat the information.
what is Contactless payment
a secure method for consumers to purchase products or services using a debit, credit, or smartcard—also known as a chip card—by using RFID technology or near-field communication (NFC)
how do fraud happen?
What is computer theft
is any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of obtaining property by any deceitful means or artful practice.
who wrote sonnet 13?
William Shakespeare
Customers are typically not angry with you they are what
they are upset with the situation and want it fixed
what is the cvv
the three digit security code on the back of the card.
What is bust out fraud
when a true cardholder applies for an account, quickly spends up the credit limit, and sometimes will make payments. Ultimately, the payments return as NSF, the cardholder never makes legitimate payments, and it becomes a collections issue
What is internal breach?
is an event in which sensitive personal information is compromised
who wrote i know why the caged bird sings?
MAYA AMGELOU
Jargon canbe use on the call. Slang as well is used.
is this true or false
false
A Sales draft is what
a record used to document that goods/ services were purchased
If cardholder cannot verify CVV because the card is damaged or he/she cannot read the number, this is a flag. Advise the cardholder to do one of the following:
Corporate security policy information holds one of three high level classification
Restricted data, confidential data, and public data
Who wrote dreamed deferred