FIG. 3A is a block diagram of the process of receiving on a second computer system data transmitted over the Internet by the first computer system of FIGS. 2A-2B, decrypting the encrypted data, translating the decrypted data into a format compatible with a call management system running on the second computer, and storing the reformatted data into a database of the second computer system.