Professional Documents
Culture Documents
IT Chapter 14
IT Chapter 14
Speaking directly with the customer is usually the first step in resolving the computer problem.
To troubleshoot a computer, you need to learn the details of the problem from the customer. A
relaxed customer is more likely to be able to provide the information that you need to determine
the source of the problem and then fix it.
If you are talking with a customer in person, that customer can see your body language. If you
are talking with a customer over the phone, that customer can hear your tone and inflection.
Customers can also sense whether you are smiling when you are speaking with them on the
phone. Many call center technicians use a mirror at their desk to monitor their facial expressions.
A good rule for all technicians to follow is that a new customer call means a fresh start. Never
carry your frustration from one call to the next.
3 common rules:
• Know - call the customer by name, ask if there’s any particular name they’d like to use
• Relate - create a one-to-one connection with the customer
• Understand - determine the customer’s level of knowledge to better communicate
To better enable you to determine the customer’s problem, practice active listening skills. Allow
the customer to tell the whole story. During the time that the customer is explaining the problem,
occasionally interject some small word or phrase, such as “I understand,” “Yes,” “I see,” or
“Okay.” This behavior lets the customer know that you are there and that you are listening.
However, a technician should not interrupt the customer to ask a question or make a statement.
This is rude, disrespectful, and creates tension.
After you have listened to the customer explain the whole problem, summarize what the
customer has said. This helps convince the customer that you have heard and understand the
situation. A good practice for clarification is to paraphrase the customer’s explanation.
After you have assured the customer that you understand the problem, you will probably have to
ask some follow-up questions. Follow-up questions should be targeted, closed-ended questions
based on the information that you have already gathered. Make sure that these questions are
pertinent. Do not ask questions that the customer has already answered while describing the
problem. Doing this only irritates the customer and shows that you were not listening.
Professional Behavior
Be positive when communicating with the customer. Tell the customer what you can do. Do not
focus on what you cannot do. Be prepared to explain alternative ways that you can help them,
such as emailing information and step-by-step instructions, or using remote control software to
solve the problem.
When you focus the customer on the problem, it allows you to control the call.
These practices make the best use of your and the customer’s time:
• Use proper language
• Listen and question
• Give feedback
Documentation
Different types of organizations have different operating procedures and processes that govern
business functions. Documentation is the main way of communicating these processes and
procedures to employees, customers, suppliers, and others.
Change Management
A good change management process can prevent business functions from being negatively
impacted by the updates, upgrades, replacements, and reconfigurations that are a normally part
of IT operations.
In information technology, a disaster can include anything from natural disasters that affect the
network structure to malicious attacks on the network itself.
A disaster recovery plan is a comprehensive document that describes how to restore operation
quickly and keep critical IT functions running during or after a disaster occurs.
Some services may even need to be available during the disaster in order to provide information
to IT personnel and updates to others in the organization.
Services that might need to be available during or immediately after a disaster include:
• Web services and internet connectivity
• Data stores and backup files
• Directory and authentication services
• Database and application services
• Telephone, email and other communication services
In addition to having a disaster recovery plan, most organizations take steps to ensure they are
ready in case a disaster occurs. These preventive measures can ease the impact of unplanned
outages on the operation of the organization.
Even the best disaster recovery procedures cannot restore services quickly if there are no
current backups of data and operating system environments.
No matter which type of backup is made, it is critical that the restore process is tested frequently
to ensure that it will function when it is needed.
Locally stored files may be accessible if communication service outages prevent accessing the
Internet. Backup files stored online, on the other hand, have the benefit of being accessible from
anywhere the Internet is available.
When you are working with customers and their equipment, there are some general ethical
customs and legal rules that you should observe. These customs and rules often overlap.
Computers and monitors are property, but property also includes any information or data that
might be accessible, such as emails, contact lists, data on computers etc.
During the troubleshooting process, you might have gathered some private information, such as
usernames and passwords. If you document this type of private information, you must keep it
confidential. Divulging customer information to anyone else is not only unethical but might be
illegal. Legal details of customer information are usually covered under the service-level
agreement (SLA). The SLA is a contract between a customer and a service provider that
defines the service or goods the customer will receive and the standards to which the provider
must comply.
Take particular care to keep personally identifiable information (PII) confidential. PII is any data
that could potentially identify a specific individual.
Payment Card Industry (PCI) information is considered personal information that needs to be
protected.
Protected Health Information (PHI) is another form of PII that needs to be secured and
protected. PHI includes patient names, addresses, dates of visits, telephone and fax numbers,
and email addresses. With the move from paper copy records to electronic records, Electronic
Protected Health Information (ePHI) is also regulated. Penalties for breaches of PHI and ePHI
are very severe and regulated by the Health Insurance Portability and Accountability Act
(HIPAA).
Actions such as the following are considered to be illegal:
You may also encounter customers that use software illegally. A software license is a contract
that outlines the legal use or redistribution of that software. It is illegal to use licensed software
without the appropriate license.
Data from computer systems, networks, wireless communications, and storage devices may
need to be collected and analyzed in the course of a criminal investigation. The collection and
analysis of data for this purpose is called computer forensics.
Illegal computer or network may include:
• Identity theft
• Using a computer to sell counterfeit goods
• Using pirated software on a computer or network
• Using a computer or network to create unauthorized copies of copyrighted materials, such as
movies, television programs, music, and video games
• Using a computer or network to sell unauthorized copies of copyrighted material
• Pornography
Cyber law is a term to describe the international, regional, country, and state laws that affect
computer security professionals. They explain the circumstances under which data (evidence)
can be collected from computers, data storage devices, networks, and wireless communications.
IT professionals must be aware of cyber law so that they understand their responsibility and their
liability as it relates to cybercrime.
First response is the term used to describe the official procedures employed by those people
who are qualified to collect evidence. System administrators, like law enforcement officers, are
usually the first responders at potential crime scenes.
Even if you are not a system administrator or computer forensics expert, it is a good habit to
create detailed documentation of all the work that you do.
If you discover illegal activity on a computer or network on which you are working, at a minimum,
document the following:
To prove the chain of custody, first responders have documentation procedures in place that
track the collected evidence. These procedures also prevent evidence tampering so that the
integrity of the evidence can be ensured.
The typical workflow of a call center starts with calls from customers displayed on a call board.
Level one technicians answer these calls in the order that the calls arrive. If the level one
technician cannot solve the problem, it is escalated to a level two technician. In all instances, the
technician must supply the level of support that is outlined in the customer’s SLA.
The primary responsibility of a level 1 technician (aka level 1 analyst, dispatcher, incident
screener) is to collect pertinent information from the customer and accurately enter all
information into the ticket or work order.
When a problem requires the expertise of a level two technician, the level one technician must
describe a customer’s problem on a work order using a succinct sentence or two. An accurate
description is important because it helps other technicians quickly understand the situation
without having to ask the customer the same questions again.
The level 2 technician (aka product specialist, technician-support personnel) is usually more
knowledgeable and experienced. The level 2 technician receives the escalated work order with
the description of the problem and then calls the customer back to ask any additional questions
and resolve the problem. Level 2 technicians can also use remote access software to connect to
the customer’s computer to update drivers and software, access the operating system, check
the BIOS, and gather other diagnostic information to solve the problem.
Basic Scripting
A script file is a simple text file written in scripting languages to automate processes and tasks
on various operating systems. In the field, a script file might be used to automate the process of
performing a backup of a customer’s data or run a list of standard diagnostics on a broken
computer.
Often, preventing the script file from running may eliminate the problem that is occurring.
A scripting language is different than a compiled language because each line is interpreted and
then executed when the script is run. Examples of scripting languages include Windows batch
files, PowerShell, Linux shell script, VBScript, JavaScript, and Python. Compiled languages such
as C, C++, C#, and Java, need to be converted into executable code using a “compiler”.
Executable code is directly readable by the CPU while scripting languages are interpreted into
code that the CPU can read one line at a time by a command interpreter or by the operating
system.
Variables are designated places to store information on the computer. Some variables are
environmental, which means they’re used by the OS to track important stuff, like usernames,
host names, password etc.
Abbreviations