Skip to content
English
  • There are no suggestions because the search field is empty.

Compliance - Data Stored per Product

Living Security stores different data sets for each product. For a complete breakdown of the data stored, please see below:

📚Overview

Living Security requires a number of data sets depending on what products your organization is adopting. We strictly use this data for application access and functionality, and we do not share this information with third party services that are not serving as a subcontractor of our applications. 

For details on how we secure your information, we recommend our Compliance - Common FAQs that covers how this data is stored and protected. 

👤 Training Platform

Living Security Training Platform utilizes the following information below for the listed purposes.

Data Purpose Use-Case Data Sets Retainment Period
User Provisioning User Access Required: First Name, Last Name, Email Address
Optional: Department, Division, Organization, Job Title, City, State, Country, User Type, Timezone, Manager Name, Manager Email, Company Roles, Access Level, Status, Last Login, Creation Date
LS Application: Unique User ID
Indefinitely, or until request for deletion received. 
Company Company Creation Required: Company Name, Authorized Domain(s)
LS Application: Unique Company ID
Indefinitely, or until request for deletion received. 
Device Information Data Logging User Agent, Device Type, Browser Type, Browser Version, OS, ISP, City, Continent, Country, IP Address, Latitude, Longitude 15 Days

🎥 CyberEscape Online Teams

Living Security Teams utilizes the following information below for the listed purposes:

Data Purpose

Use-Case

Data Sets

Retainment

User Provisioning

User Access

Required: Display Name, Email Address

LS Application: Unique User ID

Indefinitely, or until request for deletion received. 

Company

Company Creation

Required: Company Name, Authorized Domain(s)

LS Application: Unique Company ID

Indefinitely, or until request for deletion received. 

Device Information

Data Logging

User Agent, Device Type, Browser Type, Browser Version, OS, ISP, City, Continent, Country, IP Address, Latitude, Longitude

15 Days

📈 Unify Insights

Living Security Unify Insights stores a number of data sets from disparate sources within your organizations IAM and Security infrastructure. The data stored from these tools is unique for each customer's environment as no customer's environment is the same. However, below you will find examples of data Living Security typically stores:

Data Purpose Use-Case Data Sets Retainment
Example Identity Alias Data Identity Resolution Required: Email Address
Optional: Username, Employee ID, SAM Name, Directory ID, Service ID, UUID, Principle Name, etc.
Indefinitely, or until request for deletion received. 
Example Identity Segment Data Segment Filters

Department, Division, Organization, Job Title, Office Location, Business Unit, Manager information, etc.

Indefinitely, or until request for deletion received. 

Example Device Data Data Logging User Agent, Device Type, Browser Type, Browser Version, OS, OS Version, IP Address, MAC Address, etc. Indefinitely, or until request for deletion received. 
Example Security Event Data Event Insights Phish Targeted, Malware Detected, Vulnerability Detected, Device Quarantined, etc.  Indefinitely, or until request for deletion received. 
Example Security Behavior Data Behavior Insights Phish Clicked, Malicious URL Clicked, Website Blocked, Training Completed, etc. Indefinitely, or until request for deletion received. 

For Unify Insights customers, it is recommended you engage your IAM and Security Operations teams to discuss what data being pushed to the Unify Application. Living Security will cover this during the onboarding process to ensure data is aligned with expectations.