LogoLogo
HomepageSign Up
  • Security
  • Security Architecture
  • Privacy Policy
  • Security Organization
  • policies
    • Access Control
    • Change Management
    • Incident Management
    • Monitoring
    • Network and Systems
    • People Security
    • Risk Management
    • Vendor Management
    • Vulnerability Management
    • Subprocessors
    • Data Processed
  • End User Access
    • User Access Management
    • Recordings Security
  • resources
    • Service Level Agreement
    • MNDA
    • Privacy Policy
    • Terms of Service
    • Data Processing Addendum
Powered by GitBook
On this page
  • Recordings Security Guide
  • Overview
  • Recording Access Controls
  • Data Storage and Management
  • Security Considerations
  • Best Practices for Recording Security
Export as PDF
  1. End User Access

Recordings Security

Recordings Security Guide

Overview

This guide details the security features and controls available for managing recordings within Screendesk, including access controls, storage options, and data retention policies.

Recording Access Controls

Access Level Restrictions

  • Administrators can restrict recording access to authenticated users only

  • When enabled, only logged-in Screendesk users can view recordings

  • Prevents unauthorized access to sensitive content

Role-Based Access

  • Owners & Admins: Full access to all recordings

  • Editors: Can manage all recordings within the organization

  • Members: Can only manage their own recordings

Data Storage and Management

Storage Location Options

  • Administrators can select preferred storage region:

    • North America

    • Europe

  • Benefits:

    • Meets data residency requirements

    • Ensures compliance with regional regulations

    • Optimizes access speed for local users

Automatic Data Retention

  • Configurable automatic deletion rules

  • Administrators can set recordings to delete after specified number of days

  • Benefits:

    • Maintains data hygiene

    • Supports compliance requirements

    • Reduces storage costs

    • Automates data lifecycle management

Security Considerations

Data Protection

  • All recordings are stored with encryption

  • Access logs are maintained for audit purposes

  • Regional storage supports data sovereignty requirements

Compliance Support

  • Automatic deletion helps maintain data minimization principles

  • Storage location selection aids in regulatory compliance

  • Access restrictions support data protection requirements

Best Practices for Recording Security

  1. Implement authenticated-only access for sensitive content

  2. Choose storage location based on compliance requirements

  3. Set up appropriate data retention policies

  4. Regularly audit recording access patterns

  5. Document storage and retention configurations

  6. Review and update security settings periodically

    1. Train users on proper recording sharing practices

PreviousUser Access Management

Last updated 6 months ago