send email to bpos.1011@live.com
BPOs work at night due to different time zones, as they work in countries which have different time zones.
for better prospects what the bpos gives than the hotel industry
IT is Information Technology and BPO is Business Process Outsourcing. BPOs are also categorized by ITES (Information Technology Enabled Services)
no
we have work for insurance we receive scan copy by mail and fill all information witch is in certificate like policy no. policy period, coverage like general liability ,auto-liability .Mostly we do data entry.
Kenneth L. Spencer has written: 'Introducing VBScript and ActiveX' -- subject(s): ActiveX, Internet programming, VBScript (Computer program language) 'Architecting and Administrating a Microsoft Backoffice'
The job description for working in the back office would be an individual with administration and support personnel duties in a financial service company. Functions in this position include accounting, settlements, record maintenance and maintaining databases.
They are generally called Receptionists.Now a days, in the BPOs those attending customer phone calls are service providers or any other technical connotation as might be applicable to them.
While most backoffice banking has been electronic for four decades, the term e-banking generally refers to "Systems of Engagement". These are the systems which allow the customer to engage the bank in transactions or information transmission electronically. These include Internet, telephone, mobile payments, ATMs, etc.
Although such an informal attire was frowned upon in big Multi-national Companies, the influence of the BPOs culture has spilled over to other companies now; hence employees wear a pair of Jeans and a shirt with an open collar to work, without feeling hesitant that they may be badly turned out!
When a company establishes its own reputed BPO company for carrying out one or more of its process it is called a captive BPO. By establishing its own BPO the parent company reduces cost by saving on margins, is able to create a pool of expert people for performance of the task and reduces the risk of leakage of confidential information.