To comply with regulations and legal requirements, the service includes built-in functionality to securely log and handle data. All data transmitted and stored by the service is encrypted to maintain confidentiality and integrity. The platform offers tools such as configurable Terms and Conditions, Privacy Policy management, data retention settings, and opt-out functionality, providing customers with a comprehensive compliance framework.
Configurable Terms and Conditions #
The service includes the capability to configure and display customized Terms and Conditions on the captive portal. End users are required to review and accept these terms before gaining access to the network. Key features include:
- Version Control: Each version of the terms is assigned a unique ID and version number.
- Log Association: Every login is tagged with the active Terms ID, ensuring traceability of the user’s opt-in agreement.
- Revocation of Access: Administrators can revoke all active logins if the Terms and Conditions are updated, making it mandatory for users to accept the new version upon their next login.
Privacy Policy Management #
The captive portal supports the display and management of a customizable Privacy Policy, ensuring compliance with data privacy regulations.
- Dynamic Display: The privacy policy is displayed alongside the Terms and Conditions, providing clear information to end users.
- Admin Control: Administrators can update the privacy policy through the admin portal, ensuring it reflects current legal requirements and practices.
- User Agreement: End users must verify that they have had the opportunity to read the privacy policy before network access, aligning with GDPR and similar frameworks.
Data Retention #
The service supports automatic data retention policies to manage and delete records after a specified period of inactivity.
- Retention Settings: Administrators can configure the retention period through the admin portal, with a minimum retention setting of one day.
- Active Record Rules: Data is considered active based on specific criteria, such as active logins or associated guest requests.
- Automatic Deletion: Records that exceed the retention period and are inactive are automatically deleted, ensuring compliance with data minimization principles.
Criteria for Active Records #
- Email-Based Access: Active if there is an associated login.
- Meeting Host Requests: Active if linked to a pending or active guest login.
- SMS-Based Access: Active if tied to an active login using the associated phone number.
- Login History: Active until the “Valid Until” date expires.
End-User Reports #
The administration portal allows for the generation of detailed end-user reports, ensuring transparency and accountability. Reports can be generated based on the following criteria:
- MAC Address
- Email Address
- Mobile Phone Number
The reports detail how the user interacted with the service and include information such as login timestamps, devices used, authentication modules, and access activity. Reports can be exported in CSV format for further analysis or compliance purposes.
Report Highlights #
- First and Last Login Timestamps
- Device Details
- Authentication Methods Used
- Meeting Host Requests and Conference Data
Opt-Out Functionality #
The service provides an opt-out feature that can be initiated via the administration portal, ensuring compliance with user privacy requests.
- Opt-Out Criteria: Users can be opted out based on MAC address, email address, or mobile phone number.
- Impact Analysis: Before executing an opt-out request, administrators can review an impact report to assess network effects.
- Immediate Action: Opt-out requests remove the user’s data and terminate any active sessions associated with the specified identifier.
Security Measures #
The platform ensures that all data is handled securely:
- Encryption: All data in transit and at rest is encrypted.
- Controlled Access: Only authorized administrators have access to compliance-related tools and reports.
- Auditability: Comprehensive logs and reports provide a traceable history of actions and user interactions.
This robust compliance framework ensures that customers can meet legal and regulatory requirements while maintaining a secure, transparent, and user-friendly network environment.