Signals are behavioral and intent patterns that Chordia's Compass engine identifies across customer conversations. Each signal represents something specific that happened — or didn't happen — during an interaction. Unlike keyword matching or sentiment scores, signals are grounded in the structure of the conversation: what was said, in what context, and what it means for your operation.
sig.required_verification_completed

Required Verification Completed

Process Adherence
  |  
Universal

What This Signal Detects

Before agents can access account information or perform sensitive actions, they must verify that they are speaking with the authorized person. This signal identifies whether required verification steps were completed before the agent proceeded with account-specific or sensitive activities. It captures whether proper identity confirmation occurred when the interaction involved accessing personal information, making account changes, or discussing confidential details.

The signal evaluates whether verification was completed appropriately for the sensitivity level of the interaction. A general product question might require minimal verification, while account changes, payment discussions, or personal information access require more thorough identity confirmation before proceeding.

Why It Matters

Missing required verification is not a quality issue — it is a security and compliance failure. When agents skip verification steps, they create unauthorized access to customer accounts and personal information. This exposes both customers and the company to identity theft, fraud, and privacy violations that can have serious legal and financial consequences.

The regulatory requirements around verification are strict in most industries, and violations carry significant penalties. Financial services, healthcare, telecommunications, and other regulated sectors have specific standards for identity verification that are not optional. Failure to meet these standards can result in regulatory action, fines, and increased scrutiny of operations.

Even in less regulated industries, verification failures create liability exposure. When personal information is disclosed to unauthorized parties, it can lead to identity theft, financial fraud, and legal action against the company. The cost of these incidents far exceeds the time investment required for proper verification procedures.

How It Works

Compass evaluates whether appropriate verification steps were completed before sensitive information was accessed or disclosed. This includes confirming customer identity through knowledge-based authentication, verifying account ownership through security questions or personal information, and ensuring that verification requirements were met before proceeding with confidential discussions.

The evaluation considers the sensitivity level of the interaction content. Verification requirements are context-dependent — general inquiries might require basic confirmation while account modifications require more thorough identity verification.

What Teams Do With This

Compliance officers monitor verification completion rates as a critical security metric. This is not a coaching issue — it is a compliance requirement that must be maintained at extremely high levels to protect both customers and the organization from security breaches.

Security teams use verification tracking to identify potential access control failures. Missing verification steps represent security incidents that require immediate investigation and remediation to prevent unauthorized access to customer information.

Audit teams rely on verification documentation to demonstrate compliance with industry regulations and internal security policies. Complete verification records are essential for regulatory reporting and security audit requirements.

This signal is part of Chordia’s Compliance Monitoring capabilities.