Data Collection & Security

Complete Transparency onData Collection

We believe in complete transparency about what data we collect, how we use it, and how we protect it. This page provides comprehensive details about every data point collected by our desktop monitoring agent.

Last updated: January 2025

What Data We Collect

Our desktop agent collects system-level metrics for IT management purposes. Click on each section to see detailed technical specifications.

System Hardware Data

Basic system identification and hardware specifications including computer name, serial number, CPU information, memory capacity, operating system version, system architecture, uptime, and manufacturer details.

Security Assessment Data

Comprehensive security posture monitoring including compliance checks, firewall status, encryption configuration, automatic update settings, and CIS benchmark assessments to ensure your systems meet security standards.

Process & Performance Data

System performance metrics including running processes, CPU utilization, memory consumption, and application performance data to help identify bottlenecks and optimize system resources.

Application Inventory

Comprehensive inventory of installed applications including software names, versions, publishers, installation dates, size, and crash history to manage software assets and detect issues.

Network Diagnostics

Network connectivity and performance data including connection status, bandwidth measurements, latency tests, packet loss detection, and DNS resolution times for troubleshooting connectivity issues.

Custom Sensors

Administrator-configured monitoring scripts that collect specific system metrics such as disk space, service status, custom performance indicators, and business-specific measurements.

Automation Scripts

Scheduled maintenance tasks, system remediation scripts, and automated administrative operations such as software updates, cache clearing, service restarts, and custom IT workflows.

Alert System

Automated notification system that monitors sensor data and triggers alerts when thresholds are violated or system issues are detected, enabling proactive IT management.

How We Protect Your Data

Enterprise-grade security measures to ensure your data remains safe and private.

End-to-End Encryption

All data transmitted between systems uses TLS 1.3 encryption with HTTPS, ensuring data security in transit.

Encryption at Rest

All stored data is encrypted using AES-256 encryption, protecting information when stored in our databases.

Role-Based Access Control

Granular permissions system ensures users only access data appropriate to their organizational role.

Regular Security Audits

Periodic third-party security assessments and penetration testing to identify and address vulnerabilities.

No Third-Party Sharing

Your data is never shared with third parties without explicit consent. We don't sell or distribute your information.

Compliance Standards

Our platform adheres to industry security standards and best practices for data protection.

Your Rights & Control

You maintain full control over data collection and can exercise your rights at any time.

Administrator Control

Full control over data collection through sensor and script configuration. Administrators decide what metrics to monitor.

Data Retention Policies

Configurable retention periods for different data types. Historical data can be archived or deleted based on policies.

Data Deletion Rights

Request complete data deletion when deregistering systems. All associated data can be permanently removed.

Export Capabilities

Export collected data in standard formats for compliance, auditing, or migration purposes.

Questions About Data Collection?

If you have any questions about what data we collect, how we use it, or our security practices, please don't hesitate to contact our security team.

Security & Privacy Team: [email protected]

General Support: Visit our Contact Page

We are committed to transparency and will respond to all security and privacy inquiries within 48 hours.