Risk Management privileges

This table details the privileges that you can grant for Risk Management.

Administrators configure role privileges by selecting User Management from the main menu. Under Security, select Roles Setup. When editing or viewing roles, you can find privileges in the Risk Management category.

Privilege

Description

Default Role

View Risk Management

Search for Interactions in Risk Management:

  • Save searches (by user)

  • Advanced searches

  • Refine searches

  • Access recent searches (by user)

  • Add annotations

Administrator

Trader

Risk Manager

Configure Biometrics

All features available to the c privilege.

Administrator

Configure fields (CTI attributes used during identity verification of employees and customers)

Configure employees, customers, and targets (manage voiceprint models):

  • Create person (employee, customer, target) details

  • Manage voiceprint models, which includes the ability to:

    • Review voiceprint model training status

    • Review audio segments used by the model

    • Change the audio channel used for segments

    • Upload, add, and remove audio segments used to train models

      The ability to approve audio for voiceprint models is not granted. See the Approve/Unapprove Interactions for Enrollment privilege.

  • Opt out (exclude) employees and customers from voice biometrics

Configure watch lists for target detection:

  • Create and modify watch lists

  • Assign targets to watch lists

Approve/Unapprove Interactions for Enrollment

All features available to the Configure Biometrics privilege.

Administrator

 

Approve and unapprove audio used for voiceprint model training.

  • Approve and unapprove audio segments for the voiceprint model of each person (employee, customer, target)

  • Automatically approve an interaction when adding it to the voiceprint model of a person (employee, customer, target).

At least one user in the enterprise must be granted permission to approve and unapprove interactions used for enrollment. Otherwise, manual approval of interactions is not possible.

Publish Saved Searches

All features available to the View Risk Management privilege.

Administrator

Risk Manager

Manage public searches:

  • Publish private, saved searches to all users in the organization.

  • Create public, saved searches for all users in the organization.

  • Unpublish saved searches the user has published.

View Cases

All features available to the View Risk Management privilege.

Administrator

Risk Manager

Manage assignment of interactions to cases:

  • Access cases

  • Assign interactions to cases

  • Copy interaction between cases

  • Remove interactions from cases not under legal hold

  • Move interactions from cases not under legal hold to another case

Edit Cases

All features available to the View Cases privilege, plus create private cases not under legal hold.

Administrator

Risk Manager

Delete Cases

All features available to the Edit Cases privilege, plus remove cases from the system.

To delete cases under legal hold, users must also have the Disable Legal Hold privilege.

Administrator

Delete Interactions using a Recycle Bin

All features available to the Edit Cases privilege, plus:

  • Add interactions to recycle bins

  • Create recycle bins

  • Change recycle bins

  • Delete recycle bins

Administrator

Disable Legal Hold

All features available to the Edit Cases privilege, plus remove legal hold from cases.

For users with the Delete Cases privilege, Disable Legal Hold also grants permission to delete cases under legal hold.

Administrator

Enable Legal Hold

All features available to the Edit Cases privilege, plus place cases under legal hold.

Administrator

Risk Manager

Remove Interactions from Legal Hold Case

All features available to the Edit Cases privilege, plus remove interactions from cases under legal hold.

Administrator

Risk Manager

Edit Metadata Targets

All features available to View Risk Management privilege.

Administrator

Risk Manager

Configure metadata definitions for Metadata Detection.

IMPORTANT: Metadata detection configuration requires additional role permission in User Management. In addition to Edit Metadata Targets, you must also have permission to View Analytics Rules (found in Enterprise Manager Configuration under Roles Setup).

Configure watch lists for Metadata Detection:

  • Create and modify watch lists

  • Assign metadata to watch lists

IMPORTANT: Watch list configuration requires additional role permission in User Management. In addition to Edit Metadata Targets, you must also have permission to View Analytics Rules (found under Enterprise Manager Configuration).

Introduction to Risk Management privileges

Pre-Defined Risk Management roles