Share via


GTL Contact Center

Click here for more information on the Microsoft Certified app program.

Last updated by the developer on: January 10, 2024

General information

Information provided by Whizmeeting India Private Ltd to Microsoft:

Information Response
App name GTL Contact Center
ID WA200005365
Office 365 clients supported Microsoft Teams
Partner company name Whizmeeting India Private Ltd
Company's website https://www.ucglobe.net
App's Terms of Use https://www.ucglobe.net/terms-conditions
Core functionality of the app GTL Contact centre Application for Microsoft Teams helps supervisor to monitor the performance of the customer service team. This includes productivity, performance and quality control of the contact centre support executives and agents. GTL Contact centre Application handles multiple call queues to meet its SLA and performance goals.
Company headquarter location United States of America
App info page https://www.ucglobe.net/gtl-contact-center
What is the hosting environment or service model used to run your app? IsvHosted

Questions

Questions or updates to any of the information you see here? Contact us!

How the app handles data

This information has been provided by Whizmeeting India Private Ltd about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.

Information Response
Does the app or underlying infrastructure process any data relating to a Microsoft customer or their device? Yes
What data is processed by your app? Basic User Profile Data, User Presence, Online Meetings
Does the app support TLS 1.1 or higher? Yes
Does the app or underlying infrastructure store any Microsoft customer data? Yes
What data is stored in your databases? Basic User Profile Data, User Presence
If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored? United States of America
Do you have an established data rentention and disposal process? Yes
How long is data retained after account termination? Less than 30days
Do you have an established data access management process? Yes
Do you transfer customer data or customer content to third parties or sub-processors? No

Questions

Questions or updates to any of the information you see here? Contact us!

Information from the Microsoft Cloud App Security catalog appears below.

Information Response
Do you perform annual penetration testing on the app? Yes
Does the app have a documented disaster recovery plan, including a backup and restore strategy? Yes
Does your environment use traditional anti-malware protection or application controls? TraditionalAntiMalware, ApplicationControls
Do you have an established process for indentifying and risk ranking security vulnerabilities? Yes
Do you have a policy that governs your service level agreement (SLA) for applying patches? Yes
Do you carry out patch management activities according to your patching policy SLAs? Yes
Does your enviroment have any unsupported operating systems or software? No
Do you conduct quarterly vulnerability scanning on your app and the infastructure that supports it? Yes
Do you have a firewall installed on your external network boundary? Yes
Do you have an established change management process used to review and approve change requests before they are deployed to production? Yes
Is an additional person reviewing and approving all code change requests submitted to production by the original developer? Yes
Do secure coding practices take into account common vulnerability classes such as OWASP Top 10? Yes
Multifactor Authentication (MFA) enabled for: DNSManagement, Credential, CodeRepositories
Do you have an established process for provisioning, modification, and deletion of employee accounts? Yes
Do you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app? Yes
Do you have event logging set up on all system components supporting your app? Yes
Are all logs reviewed on a regular cadence by human or automated tooling to detect potential security events? Yes
When a security event is detected are alerts automatically sent to an employee for triage? Yes
Do you have a formal information security risk management process established? Yes
Do you have a formal security incident response process documented and established? Yes
Do you report app or service data breaches to supervisory authorities and individuals affected by the breach within 72 hours of detection? Yes

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Does the app comply with the Health Insurance Portability and Accounting Act (HIPAA)? N/A
Does the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)? N/A
Does the app comply with Service Organization Controls (SOC 1)? N/A
Does the app comply with Service Organization Controls (SOC 2)? No
Does the app comply with Service Organization Controls (SOC 3)? No
Do you carry out annual PCI DSS assessments against the appand its supporting environment? Yes
Is the app International Organization for Standardization (ISO 27001) certified? No
Does the app comply with International Organization for Standardization (ISO 27018)? No
Does the app comply with International Organization for Standardization (ISO 27017)? No
Does the app comply with International Organization for Standardization (ISO 27002)? No
Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant? No
Does the app comply with Family Educational Rights and Privacy Act (FERPA)? N/A
Does the app comply with Children's Online Privacy Protection Act (COPPA)? Yes
Does the app comply with Sarbanes-Oxley Act (SOX)? N/A
Does the app comply with NIST 800-171? N/A
Has the app been Cloud Security Alliance (CSA Star) certified? No

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Do you have GDPR or other privacy or data protection requirements or obligations (such as CCPA)? No

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Does your application integrate with Microsoft identity platform (Microsoft Entra ID) for single-sign on, API access, etc.? Yes
Have you reviewed and complied with all applicable best practices outlined in the Microsoft identity platform integration checklist? Yes
Does your app use the latest version of MSAL (Microsoft Authentication Library) or Microsoft Identity Web for authentication? Yes
Does your app support Conditional Access policies? No
Does your app support Continuous Access Evaluation (CAE) Yes
Does your app store any credentials in code? No
Apps and add-ins for Microsoft 365 might use additional Microsoft APIs outside of Microsoft Graph. Does your app or add-in use additional Microsoft APIs? No

Data access using Microsoft Graph

Graph Permission Permission Type Justification Microsoft Entra App ID
OnlineMeetings.Read delegated Read Users Meeting info and display the same to the supervisor 74bf5a4d-b5fe-4290-bf8a-93e780d249af
Presence.Read delegated Getting the User presence and display to the supervisor 74bf5a4d-b5fe-4290-bf8a-93e780d249af
Presence.Read.All delegated Getting the User presence and display to the supervisor 74bf5a4d-b5fe-4290-bf8a-93e780d249af
User.Read delegated Get the user's email id and sync the user info with our contact center system. 74bf5a4d-b5fe-4290-bf8a-93e780d249af
User.Read.All delegated Get the user profile picture to display avatar in the app. 74bf5a4d-b5fe-4290-bf8a-93e780d249af

This application does not have Additional APIs.

Questions

Questions or updates to any of the information you see here? Contact us!

Certification information

Control Microsoft 365 Certification Result
APPLICATION SECURITY PASS
     Penetration Testing In Scope
     Vulnerability Assessment Review (Penetration Test) In Scope
OPERATIONAL SECURITY PASS
     Awareness Training N/A
     Malware Protection - Anti-Malware In Scope
     Malware Protection - Application Control N/A
     Patch Management - Patching & Risk Ranking In Scope
     Vulnerability Scanning In Scope
     Network Security Controls (NSC) In Scope
     Change Control In Scope
     Secure Software Development/Deployment In Scope
     Account Management In Scope
     Security Event Logging, Reviewing and Alerting In Scope
     Information Security Risk Management In Scope
     Security Incident Response In Scope
     Business Continuity Plan (BCP) and Disaster Recovery Plan In Scope
DATA HANDLING SECURITY & PRIVACY PASS
     Data in Transit In Scope
     Data At Rest In Scope
     Data Retention, Back-up and Disposal In Scope
     Data Access Management In Scope
     GDPR In Scope
     HIPAA N/A

Questions

Questions or updates to any of the information you see here? Contact us!