{"version":1,"pages":[{"id":"48fDSEDKToCpoQhBN3Bb","title":"Security Organization","pathname":"/","siteSpaceId":"sitesp_UiXpd","icon":"sitemap","breadcrumbs":[{"label":"Security"}]},{"id":"i1s7xwkEE7xGaR6fLj12","title":"Access Control","pathname":"/policies/access-control","siteSpaceId":"sitesp_UiXpd","icon":"fingerprint","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"sKRGfNJsxfuRjP5GXpDw","title":"Change Management","pathname":"/policies/change-management","siteSpaceId":"sitesp_UiXpd","icon":"right-left","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"OqhSaM3g1KgkUYBlpmob","title":"Incident Management","pathname":"/policies/incident-management","siteSpaceId":"sitesp_UiXpd","icon":"fire","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"raPFgK6R8cyBHJW0abTy","title":"Monitoring","pathname":"/policies/monitoring","siteSpaceId":"sitesp_UiXpd","icon":"square-terminal","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"5Czsv1M91F5TxlaNVgmz","title":"Network and Systems","pathname":"/policies/network-and-systems","siteSpaceId":"sitesp_UiXpd","icon":"globe-wifi","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"EIG5fFWDA6MxKEQoXGv0","title":"People Security","pathname":"/policies/people-security","siteSpaceId":"sitesp_UiXpd","icon":"user-check","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"hED92NtmnpkHrsmsZCt6","title":"Risk Management","pathname":"/policies/risk-management","siteSpaceId":"sitesp_UiXpd","icon":"plug-circle-check","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"CKPkvlrnzhy4GjzvG4dn","title":"Vendor Management","pathname":"/policies/vendor-management","siteSpaceId":"sitesp_UiXpd","icon":"cart-circle-check","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"IQ04340pCEQBqnV9Z5NJ","title":"Vulnerability Management","pathname":"/policies/vulnerability-management","siteSpaceId":"sitesp_UiXpd","icon":"binary-circle-check","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"8OtMgjlpu5heJeXiTadx","title":"Subprocessors","pathname":"/policies/subprocessors","siteSpaceId":"sitesp_UiXpd","icon":"building-circle-check","description":"","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"wM4Zl2XCeoz6oXdfaHKQ","title":"Data Processed","pathname":"/policies/data-processed","siteSpaceId":"sitesp_UiXpd","icon":"file-circle-check","description":"","breadcrumbs":[{"label":"Security"},{"label":"policies"}]},{"id":"aIcZxtllyfclssjqZNnF","title":"User Access Management","pathname":"/end-user-access/user-access-management","siteSpaceId":"sitesp_UiXpd","icon":"users","breadcrumbs":[{"label":"Security"},{"label":"End User Access"}]},{"id":"VRByPeZbft9AiOgMok1L","title":"Recordings Security","pathname":"/end-user-access/recordings-security","siteSpaceId":"sitesp_UiXpd","icon":"key","breadcrumbs":[{"label":"Security"},{"label":"End User Access"}]},{"id":"EWkMbyCokgyXDDWcFoJM","title":"Overview","pathname":"/screendesk-security-architecture","siteSpaceId":"sitesp_dWCPG","icon":"hand","breadcrumbs":[{"label":"Security Architecture"}]},{"id":"GrcNJnWzlo6fiGVqI4sQ","title":"Request Screen Recording","pathname":"/screendesk-security-architecture/architecture-and-security/request-screen-recording","siteSpaceId":"sitesp_dWCPG","icon":"video","breadcrumbs":[{"label":"Security Architecture"},{"label":"Architecture and Security"}]},{"id":"r47L6k2zligDvGXGiQ10","title":"Video Conferencing","pathname":"/screendesk-security-architecture/architecture-and-security/video-conferencing","siteSpaceId":"sitesp_dWCPG","icon":"camera-security","breadcrumbs":[{"label":"Security Architecture"},{"label":"Architecture and Security"}]},{"id":"f0qk4rNldYb6GAmApOru","title":"Privacy Policy","pathname":"/screendesk-privacy","siteSpaceId":"sitesp_xbDul","icon":"user-lock","description":"Privacy policy of Screendesk. Read more if you want to learn how we intend to use your data.","breadcrumbs":[{"label":"Privacy Policy"}]},{"id":"ihrxbzLljvetpSP6SjIE","title":"Privacy for Humans","pathname":"/screendesk-privacy/privacy-for-humans","siteSpaceId":"sitesp_xbDul","icon":"head-side","description":"","breadcrumbs":[{"label":"Privacy Policy"}]},{"id":"DvzL9zxkMLh0ZPFa9WJx","title":"Data Processing Addendum","pathname":"/screendesk-privacy/data-processing-addendum","siteSpaceId":"sitesp_xbDul","icon":"scale-unbalanced-flip","description":"","breadcrumbs":[{"label":"Privacy Policy"}]},{"id":"p0RtLd3TtzppsStqvd6b","title":"Terms of Service","pathname":"/screendesk-privacy/terms-of-service","siteSpaceId":"sitesp_xbDul","icon":"list-check","description":"","breadcrumbs":[{"label":"Privacy Policy"}]},{"id":"UOMh9SU1yO3Mdj2VuDXd","title":"Use Restrictions","pathname":"/screendesk-privacy/use-restrictions","siteSpaceId":"sitesp_xbDul","icon":"circle-xmark","description":"","breadcrumbs":[{"label":"Privacy Policy"}]}]}