3DSecure (3DS) Authentication
3DSecure, also known as 3D Secure or 3DS, is a security protocol used...
Sycurio Glossary.
Explore a comprehensive glossary of key terms and concepts related to PCI compliance and secure payments on Sycurio's platform.
0
a
Average Handling Time (AHT)
Average Handling Time (AHT) in the context of call center operations...
Americans with Disabilities Act (ADA)
The Americans with Disabilities Act (ADA) is a comprehensive civil...
Authentication / User Authentication (UA)
Authentication refers to the process of verifying the identity of a...
Automatic Speech Recognition (ASR)
Automatic Speech Recognition (ASR) is a technology that converts...
Agent Assisted Payments
Agent-assisted payments in the context of call center operations...
Agent Experience (AX)
Agent Experience (AX) in the context of call center agents workflow...
Abandon
Phone calls – when a customer calls a contact centre, they may be put...
Acquirer / Banking & Finance
In the context of credit card merchant accounts, an acquirer refers...
Abandon / Contact Center
In the context of contact center call workflows, "abandon" refers to...
Advanced Intrusion Detection Environment (AIDE)
In the context of enterprise network security, the term Advanced...
b
c
Cardholder Data Environment (CDE) / PCI DSS
The term Cardholder Data Environment (CDE) in context to the Payment...
Contact Center as a Service (CCaaS)
Contact Center as a Service (CCaaS) refers to a cloud-based solution...
Card Holder Data (CHD) / PCI DSS
In the context of the Payment Card Industry Data Security Standard...
Call Reference Number (CRN)
In the context of contact center operations and telephony, a Call...
California Consumer Protection Act (CCPA)
The California Consumer Protection Act (CCPA) is a comprehensive data...
Call Reference (CR)
In the context of contact center operations, the term "Call...
Customer Experience (CX)
In a business-to-consumer (B2C) environment, "Customer Experience"...
Customer Service / Contact Center
Customer service, in the context of contact center operations, refers...
Card Security Code (CSC / CVV / CVC / CVN)
The Card Security Code, also known as the Card Verification Value...
Call Recording (CR) / Contact Center
Call Recording (CR) refers to the practice of capturing and storing...
d
Digital Payment Wallet / e-Wallet
A digital wallet, also known as an e-wallet or mobile wallet, is a...
Digital Channels / Contact Center
In the context of contact center operations, "digital channels" refer...
De-scoping PCI DSS
Descoping PCI DSS involves implementing measures to minimize the...
Dynamic Linked Library (DLL)
A Dynamic Link Library (DLL) is a file containing reusable code and...
Domain Name System (DNS)
The Domain Name System (DNS) is a distributed naming system used to...
De-Risking / Contact Centers
"De-risking" in the context of contact center operations refers to...
Dual-Tone Multiple Frequency (DTMF)
Dual Tone Multi-Frequency (DTMF) is a signaling technique used in...
DTMF Masking / Sensitive Data Masking
DTMF masking, also known as Dual Tone Multi-Frequency masking, is a...
Digital Transformation / Contact Center
Digital Transformation, in the context of contact center operations,...
Drop-outs & Call-abandonments / Contact Center
In the context of contact center operations, "drop-out" and "call...
e
f
Financial Conduct Authority (FCA) Code of Conduct - United Kingdom
The Financial Conduct Authority (FCA) in the United Kingdom has...
Frictionless Payments / Contact Center
Frictionless payments in the context of contact center operations...
Face to Face (F2F)
"Face to Face" (F2F) interactions in consumer retail and...
First Call Resolution (FCR) or First Time Resolution (FTR) / Contact Center
First Call Resolution (FCR) or First Time Resolution (FTR) is a key...
Firewall / PCI DSS
In the context of PCI DSS (Payment Card Industry Data Security...
h
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA, or the Health Insurance Portability and Accountability Act, is...
Home Based Agents, Work From Home Agents, Remote Agents / Contact Center
Home-based agents, work-from-home agents, and remote agents all refer...
Hacker / Cybercriminal
The term "hacker" generally refers to an individual who possesses...
Hidden Agent, Silent Monitoring and Supervisor Monitoring / Contact Center
In the context of contact center operations, a hidden agent refers to...
Hosted Services, Software-as-a-Service (SaaS)
In the context of Software-as-a-Service (SaaS), hosted services refer...
i
Information Commissioners Office (ICO)
The Information Commissioner's Office (ICO) is an independent...
Internal Security Assessor (ISA) / PCI DSS
In the context of the Payment Card Industry Data Security Standard...
Issuer / Banking
In the context of the payment card industry, an "issuer" refers to...
IP Security (IPSec)
IP Security (IPSec) is a set of protocols and standards used to...
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN) is a telecommunications...
Interactive Voice Response (IVR)
Interactive Voice Response (IVR) systems are automated telephony...
Interaction & Engagement / Contact Center
In the context of contact center operations, the terms "interaction"...
Insider Fraud & Criminal Activity, Rogue Agents / Contact Center
The problem of insider fraud and criminal activity, specifically...
m
MiIDII Legislation
The Markets in Financial Instruments Directive (MiFID) legislation...
Merchant / Payment Card Processing
In the context of payment card processing, a merchant refers to a...
Messaging, Messaging Applications, Social Messaging & Chat / Contact Center
Messaging technologies and applications, including social messaging...
Merchant Payment Configuration / Payment Card Processing
In the context of payment card processing, merchant payment...
Mail-Order, Telephone-Order (MOTO or MO/TO)
In the context of contact center operations, the terms...
Merchant Reference / Payment Card Processing
In payment card processing, the term "Merchant Reference" refers to a...
Merchant Credentials / Payment Card Processing
In the context of payment card processing, merchant credentials refer...
Merchant Category Code (MCC)
In the context of payment card processing, the Merchant Category Code...
Mastercard Credit Card
Mastercard is a leading global payment technology company that offers...
MasterCard Secure Authentication
MasterCard SecureCode is an authentication program offered by...
o
Outsourcing, Business Process Outsourcing (BPO)
Outsourcing refers to the practice of contracting and delegating...
On-Premises Equipment, Customer Premises Equipment (CPE) / Computing & Telephony
The concept of On-Premises or Customer Premises Equipment (CPE)...
One Time Credit Card Transaction (OTCC)
The term One Time Credit Card Transaction (OTCC) refers to a payment...
p
Pay By Bank, Instant Account Transfer, ACH & Direct Debit
In the context of B2B and B2C payment transactions, the terms "Pay By...
Payment Pages / PCI DSS
"Payment pages" refer to the webpages or screens that are...
Payment Links, Digital Payment Links, Pay By Link / Contact Center
In the context of contact center and e-commerce operations, the terms...
Payment Card Industry Software Security Framework (PCI SSF)
The Payment Card Industry Software Security Framework (PCI SSF) is a...
Pause & Resume / Contact Center
In the context of PCI DSS compliance, contact center operations, and...
PCI DSS Audit
A PCI DSS Audit conducted by a Qualified Security Assessor (QSA)...
Point to Point Encryption (P2PE) / Payment Processing
Point-to-Point Encryption (P2PE) is a security technology and...
Payment Cards / PCI DSS
In the context of the PCI SSC (Payment Card Industry Security...
PCI DSS Scope
PCI DSS Scope refers to the extent or boundaries of the systems,...
PCI Compliance / PCI DSS Compliance
PCI Compliance (or more correctly, PCI DSS compliance) refers to the...
s
Service Provider / PCI DSS
In the context of PCI DSS (Payment Card Industry Data Security...
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP) is a communication protocol used...
Sensitive Authentication Data (SAD) / PCI DSS
Sensitive Authentication Data (SAD) refers to specific cardholder...
Strong Customer Authentication (SCA)
Strong Customer Authentication (SCA) is an essential element of the...
Secure Payments & Securing Card Not Present Payments
Securing card-not-present (CNP) payments in contact center operations...
Session Border Controller (SBC)
A Session Border Controller (SBC) is a network element that plays a...
Speech-based Payments / Contact Center
Speech-based payments in contact center operations refer to the use...
Security Vulnerabilities / Contact Center
Contact centers can be susceptible to various security...
Software as a Service (SaaS)
Software as a Service (SaaS) is a cloud computing model in which...
Self-service / Contact Center
The role of self-service in contact center operations involves...
t
u
Uniform Resource Locator (URL)
The term "Uniform Resource Locator" (URL) refers to the address or...
Unified Communications as a Service (UCaaS)
Unified Communications as a Service (UCaaS) is a cloud-based...
Up-sell & Cross-sell / Contact Center
Up-selling and cross-selling are sales techniques used in contact...
User Experience (UX)
The overall experience and satisfaction that users have when...
v
Verified by Visa Authentication
Verified by Visa is an authentication program designed to enhance the...
Virtual Private Network (VPN) / Contact Center
Virtual Private Network (VPN) is a technology that allows remote...
Virtual Agent, AI Chatbot & Voicebot / Contact Center
Virtual agents, AI chatbots, and voicebots offer several...
Visa Credit Card
Visa is a global payment technology company that offers a wide range...
Visa Service Provider, Visa Global Registry of Service Providers
The Visa Service Provider program is an initiative by Visa, a leading...
No results found.