We recently purchased both the K1000 and K2000 for our university and are in the process of training now. However, before we deploy agents to faculty and staff systems, we would like to work out our privacy policy with respect to the kbox agent.

Does anyone have a sample privacy policy to share relating to the information that the K1000 agent collects and how that information will and will not be used?

0 Comments   [ + ] Show Comments


Please log in to comment

Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.


"Nothing is Private" :)
In all seriousness, we collect information about the hardware and installed/running software. No details of individual files or other data is collected via the agent unless your organization configures a custom inventory rule to do so.

Here's the one I wrote a while back:

This privacy policy covers our treatment of your personal information that we gather when you access or use any of our websites or services. By visiting our website, submitting information to us, or using any of our services, you accept the practices outlined in this Privacy Policy.
Information We Collect And How We Use It
There are a few ways that we collect information about you, most of which is necessary for us to provide you with the service we are providing. To manage your computer systems, and as part of providing this service, we will gather information about your systems that will be stored with us in a secure location. This information may include information about your computer usage, hardware informations, software installations, and other IT-related information. We do not collect from your computer any information about individual files, or data from those files. In the event that we inventory files it will be limited to use for inventory management purposes.
Information Sharing
We don’t (and won’t) sell your information to anyone, and currently do not share any of your information with anybody outside our organization. In the event this information must be shared with public law enforcement personnel or court systems in the jurisdiction servicing this organization we may comply at the discretion of the legal department and directors office.
Information security
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to our employees, contractors and agents who need to know that information in order to process it on our behalf. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
Changes To This Privacy Policy
Please note that as our service becomes generally available we will update this Privacy Policy to cover our expanded product and service offerings. We’ll make a bigger deal of any changes that we think will have any major impact on our user’s privacy and information.
Answered 06/03/2011 by: cblake
Red Belt

Please log in to comment
Answer this question or Comment on this question for clarity