Compliance - Data Stored per Product
Living Security stores different data sets for each product. For a complete breakdown of the data stored, please see below:
📚Overview
Living Security requires a number of data sets depending on what products your organization is adopting. We strictly use this data for application access and functionality, and we do not share this information with third party services that are not serving as a subcontractor of our applications.
For details on how we secure your information, we recommend our Compliance - Common FAQs that covers how this data is stored and protected.
👤 Training Platform
Living Security Training Platform utilizes the following information below for the listed purposes.
Data Purpose | Use-Case | Data Sets | Retainment Period |
User Provisioning | User Access | Required: First Name, Last Name, Email Address Optional: Department, Division, Organization, Job Title, City, State, Country, User Type, Timezone, Manager Name, Manager Email, Company Roles, Access Level, Status, Last Login, Creation Date LS Application: Unique User ID |
Indefinitely, or until request for deletion received. |
Company | Company Creation | Required: Company Name, Authorized Domain(s) LS Application: Unique Company ID |
Indefinitely, or until request for deletion received. |
Device Information | Data Logging | User Agent, Device Type, Browser Type, Browser Version, OS, ISP, City, Continent, Country, IP Address, Latitude, Longitude | 15 Days |
🎥 CyberEscape Online Teams
Living Security Teams utilizes the following information below for the listed purposes:
Data Purpose |
Use-Case |
Data Sets |
Retainment |
User Provisioning |
User Access |
Required: Display Name, Email Address LS Application: Unique User ID |
Indefinitely, or until request for deletion received. |
Company |
Company Creation |
Required: Company Name, Authorized Domain(s) LS Application: Unique Company ID |
Indefinitely, or until request for deletion received. |
Device Information |
Data Logging |
User Agent, Device Type, Browser Type, Browser Version, OS, ISP, City, Continent, Country, IP Address, Latitude, Longitude |
15 Days |
📈 Unify Insights
Living Security Unify Insights stores a number of data sets from disparate sources within your organizations IAM and Security infrastructure. The data stored from these tools is unique for each customer's environment as no customer's environment is the same. However, below you will find examples of data Living Security typically stores:
Data Purpose | Use-Case | Data Sets | Retainment |
Example Identity Alias Data | Identity Resolution | Required: Email Address Optional: Username, Employee ID, SAM Name, Directory ID, Service ID, UUID, Principle Name, etc. |
Indefinitely, or until request for deletion received. |
Example Identity Segment Data | Segment Filters |
Department, Division, Organization, Job Title, Office Location, Business Unit, Manager information, etc. |
Indefinitely, or until request for deletion received. |
Example Device Data | Data Logging | User Agent, Device Type, Browser Type, Browser Version, OS, OS Version, IP Address, MAC Address, etc. | Indefinitely, or until request for deletion received. |
Example Security Event Data | Event Insights | Phish Targeted, Malware Detected, Vulnerability Detected, Device Quarantined, etc. | Indefinitely, or until request for deletion received. |
Example Security Behavior Data | Behavior Insights | Phish Clicked, Malicious URL Clicked, Website Blocked, Training Completed, etc. | Indefinitely, or until request for deletion received. |
For Unify Insights customers, it is recommended you engage your IAM and Security Operations teams to discuss what data being pushed to the Unify Application. Living Security will cover this during the onboarding process to ensure data is aligned with expectations.