Available DGW Firmware Versions

Latest DGW Version

Previous DGW Version

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: updated @ 2023-08-09T10:36:28.279102
HTML
headtrue
encodingUTF-8
<!DOCTYPE html
  SYSTEM "about:legacy-compat">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta charset="UTF-8"><meta name="copyright" content="(C) Copyright 2023"><meta name="DC.rights.owner" content="(C) Copyright 2023"><meta name="DC.type" content="topic"><meta name="prodname" content="All Mediatrix Products"><meta name="version" content="DGW 49.12.28842941"><meta name="platform" content="all"><meta name="DC.date.modified" content="2023-0308-2809"><meta name="DC.date.issued" content="2023-0308-2809"><meta name="DC.date.available" content="2023-0308-2809"><meta name="ChapterNumbering" content="no"><meta name="DC.format" content="HTML5"><meta name="DC.identifier" content="topic_title_Personal_Data_Exposure_d1e15"><link href="https://fonts.googleapis.com/css?family=Open+Sans" rel="stylesheet"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/75012976/commonltr.css"><link rel="stylesheet" type="text/css" href="https://documentation.media5corp.com/download/attachments/75012976/custom.css"><title>Personal Data Usage and Protection</title></head><body class="nobody"><header role="banner"><div class="topicmeta title"> Personal Data Usage and Protection</div><div class="topicmeta date">2023-0308-28<09</div><div class="topicmeta product">All Mediatrix Products</div><div class="topicmeta version">DGW 49.12.2884<2941</div><div class="topicmeta pdf"><a href="https://documentation.media5corp.com/download/attachments/75012976/Personal%20Data%20Usage%20and%20Protection.pdf" rel="nofollow">Download PDF Document</a></div><hr><span style="float: inline-end;"></span></header><nav role="toc"><ul><li><a href="#topic_title_Personal_Data_Exposure_d1e15">Personal Data Exposure</a><ul><li><a href="#concept_fkh_j15_dhb">Personal Data Collection</a></li><li><a href="#concept_j13_pg5_dhb">Personal Data Processing</a></li><li><a href="#concept_cq4_y35_dhb">Personal Data Transfers</a></li></ul></li><li><a href="#topic_title_Personal_Data_Protection_d1e19">Personal Data Protection</a><ul><li><a href="#concept_u1q_ljb_2hb">System and Data Protection</a></li><li><a href="#reference_jyn_gfv_jdb">Communications Protection (VoIP Calls)</a></li><li><a href="#concept_nrm_vlb_2hb">Access and Communications</a></li><li><a href="#concept_wjf_2mb_2hb">Data Deletion</a></li><li><a href="#concept_sbc_3mb_2hb">Audit </a></li></ul></li><li><a href="#concept_fqm_rv4_k4">Copyright Notice</a></li></ul></nav><main role="main"><article role="article" aria-labelledby="ariaid-title1"><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="nested0" aria-labelledby="ariaid-title1" id="topic_title_Personal_Data_Exposure_d1e15">
   <h1 class="title topictitle1" id="ariaid-title1">Personal Data Exposure</h1>
<article class="topic concept nested1" aria-labelledby="ariaid-title2" id="concept_fkh_j15_dhb">
 <h2 class="title topictitle2" id="ariaid-title2">Personal Data Collection</h2>
 
 <div class="body conbody"><p class="shortdesc">Mediatrix products collect the basic personal data required for the proper delivery of
    the telecommunication service. The actual collected data depends on the type of users and how
    the Mediatrix products are administrated. </p>
  <div class="p">
      <table class="table frame-all" id="concept_fkh_j15_dhb__table_bxn_4h5_dhb"><caption></caption><colgroup><col style="width:24.93765586034913%"><col style="width:33.16708229426435%"><col style="width:41.895261845386536%"></colgroup><thead class="thead">
            <tr class="row">
              <th class="entry colsep-1 rowsep-1" id="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__1">Type of users</th>
              <th class="entry colsep-1 rowsep-1" id="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__2">Collected Personal Information</th>
              <th class="entry colsep-1 rowsep-1" id="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__3">Collected Activity Information</th>
            </tr>
          </thead><tbody class="tbody">
            <tr class="row">
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__1">End-Users</td>
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__2">Name and phone number used to register to the telecommunication provider
                service.</td>
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__3">Calls history for billing purposes and call details and recordings for
                troubleshooting purposes. For example:<ul class="ul" id="concept_fkh_j15_dhb__ul_xdf_vh5_dhb">
                  <li class="li">Call date/time and duration</li>
                  <li class="li">IP address</li>
                  <li class="li">Voice or video stream</li>
                  <li class="li">Fax or modem data stream</li>
                  <li class="li">In-call digits dialled (DTMF)</li>
                  <li class="li">E911 geo-localisation</li>
                  <li class="li">Voicemail PIN</li>
                  <li class="li">etc.</li>
                </ul></td>
            </tr>
            <tr class="row">
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__1">System Administrators and Technical Support</td>
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__2">Account name and password used to access the product for administrative and
                troubleshooting purposes.</td>
              <td class="entry colsep-1 rowsep-1" headers="concept_fkh_j15_dhb__table_bxn_4h5_dhb__entry__3">
                <ul class="ul" id="concept_fkh_j15_dhb__ul_rvw_d35_dhb">
                  <li class="li">Logs of the administration and troubleshooting activities.</li>
                  <li class="li">Audit trails of the administration and troubleshooting activities.</li>
                </ul>
              </td>
            </tr>
          </tbody></table>
    </div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title3" id="concept_j13_pg5_dhb">
 <h2 class="title topictitle2" id="ariaid-title3">Personal Data Processing</h2>
 
 <div class="body conbody"><p class="shortdesc">Personal data is processed in Mediatrix products through the following
  activities:</p>
  <div class="p">
   <ul class="ul" id="concept_j13_pg5_dhb__ul_uc1_rg5_dhb">
    <li class="li">Configuring and storing end-user data</li>
    <li class="li">Recording voice and fax calls</li>
    <li class="li">Logging call history (CDR)</li>
    <li class="li">Logging administration audit trails</li>
    <li class="li">Access of the personal data by an authorised system administrator</li>
    <li class="li">Provisioning data</li>
    <li class="li">Maintenance, administration and technical support records</li>
    <li class="li">Audit trails</li>
    <li class="li">End-user activity records</li>
    <li class="li">End-User personal content</li>
    <li class="li">Recording voice and fax calls for troubleshooting</li>
   </ul>
  </div>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title4" id="concept_cq4_y35_dhb">
 <h2 class="title topictitle2" id="ariaid-title4">Personal Data Transfers</h2>
 
 <div class="body conbody"><p class="shortdesc">The following collected personal  data may be transferred to other systems, depending on
  how the device administrators configure the Mediatrix products.</p>
  <div class="p">
   <ul class="ul" id="concept_cq4_y35_dhb__ul_gys_mj5_dhb">
    <li class="li">Call Details Records (CDR) may be sent to an external call accounting system.</li>
    <li class="li">Logs may be sent over an external monitoring system for live troubleshooting.</li>
    <li class="li">Administration activity logs may be sent over an external monitoring system for
     auditing.</li>
    <li class="li">Backups of the Mediatrix products, containing collected personal data, may be retrieved by
     an authorised system administrator.</li>
    <li class="li">Network captures from the Mediatrix products, containing collected personal data, may be
     retrieved by an authorised system administrator for troubleshooting purposes.</li>
   </ul>
  </div>
 </div>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic nested0 nobody" aria-labelledby="ariaid-title5" id="topic_title_Personal_Data_Protection_d1e19">
   <h1 class="title topictitle1" id="ariaid-title5">Personal Data Protection</h1>
<article class="topic concept nested1" aria-labelledby="ariaid-title6" id="concept_u1q_ljb_2hb">
 <h2 class="title topictitle2" id="ariaid-title6">System and Data Protection</h2>
 
 <div class="body conbody"><p class="shortdesc">To protect the end-user personal data stored inside the Mediatrix devices, the device
  administrator should control and restrict access to the management interfaces by:</p>
  <div class="p">
   <ul class="ul" id="concept_u1q_ljb_2hb__ul_evk_nkb_2hb">
    <li class="li">Forcing the use of a strong authentication password</li>
    <li class="li">Authorising LAN access only</li>
    <li class="li">Using the device firewall service to limit the remote access to the device to only
     authorized peers and authorised services</li>
    <li class="li">Using an external firewall</li>
    <li class="li">Enabling IEEE 802.1x authentication of Ethernet link</li>
   </ul>
  </div>
  <p class="p">The device administrator may also enforce the use of encryption and authentication for a secure
   administration of the Mediatrix devices:</p>
  <ul class="ul" id="concept_u1q_ljb_2hb__ul_nsx_wkb_2hb">
   <li class="li">Authenticated Management Interfaces: <ul class="ul" id="concept_u1q_ljb_2hb__ul_osx_wkb_2hb">
     <li class="li">Web Interface: HTTPS with trusted certificates</li>
     <li class="li">CWMP: HTTPS with trusted certificates</li>
     <li class="li">CLI: SSH</li>
    </ul></li>
   <li class="li">Secure Management Operations:<ul class="ul" id="concept_u1q_ljb_2hb__ul_psx_wkb_2hb">
     <li class="li">Consult or retrieve the stored personal data: HTTPS with trusted certificates</li>
     <li class="li">Provisioning: HTTPS with trusted certificates </li>
     <li class="li">Firmware upgrades: HTTPS with trusted certificates</li>
     <li class="li">Backup/restore: HTTPS with trusted certificates</li>
    </ul></li>
  </ul>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic reference nested1" aria-labelledby="ariaid-title7" id="reference_jyn_gfv_jdb">
  <h2 class="title topictitle2" id="ariaid-title7">Communications Protection (VoIP Calls)</h2>
  
  <div class="body refbody"><p class="shortdesc">The device administrator may configure the encryption of the data that transits through
    Mediatrix products:</p>
    <section class="section">
      <ul class="ul" id="reference_jyn_gfv_jdb__ul_edw_jfv_jdb">
        <li class="li">Call signalling: SIP over TLS with trusted certificates</li>
        <li class="li">Media packets: SRTP</li>
      </ul>
    </section>
  </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title8" id="concept_nrm_vlb_2hb">
 <h2 class="title topictitle2" id="ariaid-title8">Access and Communications</h2>
 <div class="body conbody">
  <div class="p">The Mediatrix products have three (3) default account roles:<ul class="ul" id="concept_nrm_vlb_2hb__ul_wdp_xlb_2hb">
    <li class="li">Administrator</li>
    <li class="li">User (no password access)</li>
    <li class="li">Observer (read-only)</li>
   </ul></div>
  <p class="p">All the management interfaces are restricted to authorised accounts only, verified by username
   and password. Refer to the  <a class="xref" href="#concept_u1q_ljb_2hb" title="To protect the end-user personal data stored inside the Mediatrix devices, the device administrator should control and restrict access to the management interfaces by:">System and Data Protection</a>
   section for the list of management interfaces and how to protect them.</p>
  <p class="p">The account credentials may be stored locally in the Mediatrix devices or in an external RADIUS
   authentication server.</p>
  <p class="p">In all cases, the device administrator should restrict the physical access to the Mediatrix
   products.</p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title9" id="concept_wjf_2mb_2hb">
 <h2 class="title topictitle2" id="ariaid-title9">Data Deletion</h2>
 
 <div class="body conbody"><p class="shortdesc">The Mediatrix products allow an authorised system administrator to delete end-user
  registration information (name and number).</p>
  <div class="p">A system administrator should also delete any temporary logs that may have been stored locally
   during a troubleshooting session such as:<ul class="ul" id="concept_wjf_2mb_2hb__ul_uxs_wnb_2hb">
    <li class="li">call history</li>
    <li class="li">call recordings</li>
    <li class="li">network captures</li>
   </ul></div>
  <p class="p">A factory reset can be performed by a system administrator to revert a Mediatrix device back to
   its default factory state through a factory reset, thus erasing all the collected data and
   configuration.</p>
 </div>
</article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested1" aria-labelledby="ariaid-title10" id="concept_sbc_3mb_2hb">
 <h2 class="title topictitle2" id="ariaid-title10">Audit </h2>
 <p class="shortdesc">Audit trail logs of the system administrator activities may be enabled by the device
  administrator. These audit logs may be temporarily stored locally or sent through syslog to an
  external monitoring system.</p>
</article></article><hr><span style="float: inline-end;"><a href="#">Top</a></span><article class="topic concept nested0" aria-labelledby="ariaid-title11" id="concept_fqm_rv4_k4">
 <h1 class="title topictitle1" id="ariaid-title11">Copyright Notice</h1>
 

 <div class="body conbody"><p class="shortdesc">Copyright © 2023 Media5 Corporation.</p>
  <p class="p">This document contains information that is proprietary to Media5 Corporation.</p>
  <p class="p">Media5 Corporation reserves all rights to this document as well as to the Intellectual Property
   of the document and the technology and know-how that it includes and represents.</p>
  <p class="p">This publication cannot be reproduced, neither in whole nor in part, in any form whatsoever,
   without written prior approval by Media5 Corporation.</p>
  <p class="p">Media5 Corporation reserves the right to revise this publication and make changes at any time
   and without the obligation to notify any person and/or entity of such revisions and/or
   changes.</p>
 </div>
</article></article></main></body></html>