Compliance Reports
Compliance Reports |
|
User Change Log - Table |
The report documents and tracks all changes made to user provisioning, including the addition of new users and updates to existing user information, such as names, phone numbers, and roles. It also captures the credentials of the person responsible for making these changes. This report provides a detailed audit trail of user management activities, ensuring accountability, transparency, and security in the process of assigning or modifying user access and roles. It is useful for compliance, security monitoring, and administrative oversight. |
User Access Log - Table |
The report documents each instance when a user accesses and exits the platform. This report tracks user logins, providing a record of platform access events. It helps monitor user activity, ensure security, and analyze usage patterns for compliance, auditing, or performance evaluation purposes. |
Address Book Change Log - Table |
The report documents and tracks all changes made to the address book, including the addition of new users and updates to user information such as names, emails and phone numbers. It also captures the credentials of the person responsible for making these changes. This report provides a detailed audit trail of modifications to the address book, ensuring accountability and security in the management of contact information. It is useful for compliance, monitoring, and maintaining the integrity of user data. |
Usage Report - Table |
The report documens and analyzes platform usage across the organization. This report tracks various metrics related to user activity, interactions, and system engagement, providing insights into how frequently and effectively the platform is being utilized by the organization. It helps assess overall usage trends, identify active or inactive users, monitor system performance, and support decision-making regarding resource allocation, and platform optimization. |
Container Access Permission Change Log - Table |
The report documents and tracks all changes made to access permissions for flexible containers. This includes detailing any modifications to the access rules, as well as the credentials of the person making these changes. The report provides an audit trail for security and compliance purposes, ensuring transparency and accountability in the management of container access. It helps monitor permission adjustments to maintain control over sensitive content and ensure authorized access. |