Engagement Reports 2

Engagement Reports

​​

Engagement Reports

Report Objective

Content Files Accessed Per Month - Graph

Presents a graphical representation of content file activity, displaying the count of files accessed each month, files shared and not accessed per month. This visual overview helps analyze trends in file engagement and sharing patterns over time, providing insights into document usage and identifying areas where engagement may be lacking.

Content Files Accessed Most - Table

Provides a list of the top 5 most accessed content files within a specified time frame. This helps identify the most engaged documents, offering insights into user interest and content performance over the designated period.

Content Access Summary - Table

This summary report provides an overview of data file access activity, including the number of authorized viewers, user engagement (such as views, opens, and downloads), and the timeline of access events. It also offers filtering within a designated time frame, allowing for a focused assessment of document security, usage, and compliance with access controls during specific periods.

Content Access Detail - Table

This report provides comprehensive documentation of every content file access, detailing each viewer's interactions, including first and last access timestamps, duration of access, and number of downloads. The report also includes filtering and analysis by specific content files, enabling a thorough review of user engagement and ensuring compliance with security protocols for all shared documents.

Container Status - Graph

The report analyzes and visualizes the distribution of containers across different statuses (active, blocked, expired, locked) within a specific time frame. It aims to provide insights into the status trends and help monitor container management or system performance.

Container Interaction - Graph

The report analyzes and presents data on container interactions during a designated period. It focuses on three key metrics: the number of containers secured, the number accessed, and the number of containers downloaded. This helps in understanding usage patterns, user engagement, and the level of activity related to containers over the specified timeframe.

Container Status - Table

The report provides a detailed overview of each container's status and associated data. It includes information on the container's structure, the date it was secured, the number of authorized viewers, the number of content files, the number of container downloads, and containers with references. This analysis helps in understanding the security, distribution, and usage patterns of containers, offering insights into their accessibility, viewer engagement, and how often they are referenced or downloaded.

Access Denied - Table

The report is to provides detailed information about instances where access to containers was denied. It includes data such as the viewer's identity, IP address, location (city, state, country), timestamp of the denial, and the reason for the denial. This helps to identify potential security issues, track unauthorized access attempts, and analyze patterns of access denial to improve container management and security protocols.

Share Not Accessed - Graph

The report visually compares the number of containers that have not been accessed with the total number of containers secured. This graph helps in identifying the proportion of containers that remain unviewed after being secured, offering insights into engagement levels, content effectiveness, and potential barriers to access. It is useful for assessing the overall performance of content distribution efforts and guiding decisions to improve user interaction and engagement with secured containers.

Shared Not Accessed - Table

The report lists containers that have been shared but not accessed, providing data such as the container name, content file, status, and the date the container was secured. The report can be filtered by time and is useful for identifying unengaged recipients. It helps in taking action to renew interest, such as resending the containers for follow-up, improving engagement strategies, and ensuring that important content is being accessed by its intended audience.

Viewer Information - Table

The report provides a detailed record of each viewer who accessed containers, capturing their identity, IP address, location (city, state, country), and timestamps for both their first and last access to the platform. This helps track viewer activity, monitor usage patterns, and ensure security by identifying repeated access and potential unusual behavior over time.

Viewer Content Files Opened - Graph

The report visually represents the top 10 viewers who accessed the highest number of content files. This graph highlights user engagement and activity levels by identifying the viewers who interacted with the most content. It provides insights into user behavior, helps assess the level of interest or involvement with the content, and can inform decisions related to content distribution, user management, or targeted follow-up actions.

Viewer Duration Viewing Files - Graph

The report visually presents the top 10 viewers who spent the most time viewing content files. By highlighting the viewers with the longest viewing durations, the graph provides insights into user engagement, helping to identify individuals who may have shown greater interest or conducted more in-depth reviews of the content. This information can be useful for understanding content consumption patterns, assessing viewer focus, and making decisions about content strategy or user follow-ups.

Viewer Downloads - Graph

The report is to visually presents the top 5 viewers who downloaded the most files. This graph highlights the users most actively downloading content, providing insights into engagement levels and potential interest in the material. It helps track file distribution, monitor user activity, and can inform decisions related to security, content access, or user behavior analysis.

Viewer Files Not Opened - Graph

The report visually presents the top 10 viewers who did not open the content files that were shared with them. This graph helps identify users who received content but did not engage with it, providing insights into potential issues such as lack of interest, technical difficulties, or disengagement. It can be used to improve follow-up strategies, assess the effectiveness of content distribution, and ensure important files are being accessed by intended recipients.

Viewer Audit - Table

The report tracks and documents each instance when a viewer accessed a content file, providing key metrics such as the content file name, date secured, percentage of the file completed, number of pages viewed, duration of access, location (city, state, country), and timestamps for start and end times. The data can be filtered by user, offering a detailed view of all files accessed by a single viewer over a designated period of time. This report is useful for monitoring user activity, analyzing engagement patterns, and documenting compliance with regulatory or internal policies.

Content File Audit -Table

The report provides comprehensive details of each viewer's interaction with a designated content file. It collects detailed data including the viewer's name, email, pages accessed, duration on each page, location (city, state, country), and timestamps for the start and end of their access. The report allows for filtering by content file, providing insights into all viewers that engaged with a specific data file. This helps to monitor user behavior, analyze content engagement, and identify trends or patterns in content access. This report is helpful in documenting all data file access for compliance purposes.

Containers Blocked - Table

The report tracks and documents the details of containers that were blocked and subsequently unblocked. It collects information such as the container name, current status, date sent, recipients, action taken (blocked or unblocked), the reason for the action, and the date of the action. This report helps monitor the lifecycle of containers, provides insights into why and when containers were restricted or restored, and ensures proper management and accountability in container handling processes. It can also assist in auditing and compliance efforts.

Containers Deleted - Table

The report documents all instances where secured containers have been deleted from a user's library. It gathers data such as the user's email, user name, container name, timestamp of deletion, location (city, state, country), and IP address. This report is useful for tracking container management, identifying when and where containers are removed, and ensuring compliance with data retention policies. It helps maintain oversight of user actions and enhances security by monitoring container deletions.

Containers Downloaded - Table

The report tracks and documents all secured containers that have been downloaded to a local device. It collects data such as the user’s email, user name, container name, timestamp of the download, location (city, state, country), and IP address. This report helps monitor container distribution, identify where and when containers are being downloaded, and ensure security by tracking the movement of secured containers across devices. It can also be useful for auditing, compliance, and security purposes.