INTRODUCTION
This white paper addresses security and privacy
related information for
Polycom
RealAccess™
Analytics
. It also describes the security features and
access controls in Poly’s processing of personally
identifiable information or personal data (“personal
data”) and customer data in connection with the
provisioning and delivery of the Polycom RealAccess
product, and the location and transfers of personal
and other customer data. Poly uses such data in a
manner consistent with the Poly Privacy Policy and
this white paper (as may be updated from time to
time). This white paper is supplemental to the Poly
Privacy Policy. The most current version of this white
paper will be available on Poly’s website.
OVERVIEW
Polycom RealAccess provides a subscribing
customer access to a dedicated web portal, which
includes a broad range of on-demand monitoring and
management of video conferencing services, along
with in-depth reporting capabilities. Reports are
based on data (including certain personal data of
customer as described below) collected from a
customer’s Polycom RealPresence Platform and
automatically uploaded to the cloud-based
RealAccess portal using a data extraction agent
installed on the customer’s premises.
SECURITY AT POLY
Security is always a critical consideration for any
product. Poly aligns with ISO/IEC 27001:2013
practices for our Information Security Management
System (ISMS). ISO/IEC 27001 is the most widely
accepted international standard for information
security best practices and a tangible measure by
which existing and potential customers can be
reassured that Poly has established and
implemented best-practice information security
processes. ISO/IEC 27001:2013 not only reinforces
our commitment to information security best practices
and controls, but it explicitly includes the product
development process.
Product security at Poly is managed through the Poly
Security Office (PSO), which oversees secure
software development standards and guidelines. The
Poly Product Security Standards align with NIST
Special Publication 800-53, ISO/IEC 27001:2013 and
OWASP for application security.
Guidelines, standards, and policies are implemented
to provide our developers industry-approved methods
for adhering to the Poly Product Security Standards.
SECURE SOFTWARE DEVELOPMENT
LIFE CYCLE
Poly follows a Secure Software Development Life
Cycle (S-SDLC) with an emphasis on security
throughout the product development process. Every
phase of the development process ensures security
by establishing security requirements alongside
functional requirements as part of initial design.
Architecture reviews, code reviews, internal
penetration testing, and attack surface analysis are
performed to verify the implementation.
The S-SDLC implemented by Poly also includes a
significant emphasis on risk analysis and vulnerability
management. To increase the security posture of
Poly products, a defense-in-depth model is
systematically incorporated through layered
defenses. The principle of least privilege is always
followed. Access is disabled or restricted to system
services nonessential to standard operation.
Additional testing, in the form of standards-based
Static Application Security Testing and patch
management, is a cornerstone of our S-SDLC.
PRIVACY BY DESIGN
Poly implements internal policies and measures
based on perceived risks which meet the principles of
data protection by design and data protection by
default. Such measures consist of minimizing the
processing of personal data, anonymizing personal
data as soon as possible, transparently documenting
the functions, and processing of personal data and
providing features which enable the data subject to
monitor the data processing while also enabling the
data controller to create and improve security
features.
When developing, designing, selecting, and using
applications, services and products that are based on