2021 Plantronics, Inc. All rights reserved. Poly, the propeller
design, and the Poly logo are trademarks of Plantronics, Inc.
All other trademarks are the property of their respective
owners.
Contents
Before You Begin................................................................................................3
Related Poly and Partner Resources..................................................................................3
How Data Subject Rights Are Supported.......................................................15
Right to Access................................................................................................................. 15
Right to Be Informed......................................................................................................... 15
Right to Data Portability.................................................................................................... 16
Right to Erasure................................................................................................................ 16
Right to Rectification......................................................................................................... 16
Purposes of Processing Personal Data......................................................... 17
How Administrators Are Informed of Any Security Anomalies
(Including Data Breaches)...........................................................................19
1
How Personal Data Is Deleted.........................................................................20
Reset Your G200 System..................................................................................................20
Factory Restore Your System........................................................................................... 21
Contents
2
Before You Begin
Topics:
▪Related Poly and Partner Resources
The Poly G200 Privacy Guide provides information on how Poly products utilize customer data and how
customers can configure Poly G200 systems to process personal data.
Related Poly and Partner Resources
See the following sites for information related to this product.
▪The Poly Online Support Center is the entry point to online product, service, and solution support
information including Video Tutorials, Documents & Software, Knowledge Base, Community
Discussions, Poly University, and additional services.
▪The Polycom Document Library provides support documentation for active products, services, and
solutions. The documentation displays in responsive HTML5 format so that you can easily access
and view installation, configuration, or administration content from any online device.
▪The Poly Community provides access to the latest developer and support information. Create an
account to access Poly support personnel and participate in developer and support forums. You can
find the latest information on hardware, software, and partner solutions topics, share ideas, and
solve problems with your colleagues.
▪The Poly Partners are industry leaders who natively integrate the Poly standards-based
RealPresence Platform with their customers’ current UC infrastructures, making it easy for you to
communicate face-to-face with the applications and devices you use every day.
▪The Poly Services help your business succeed and get the most out of your investment through the
benefits of collaboration.
3
Privacy-Related Options
Topics:
▪Call Detail Report (CDR)
▪View Recent Calls List
•Change the Password
▪Add, Edit, or Delete Contacts
▪Configure Deployment Mode
•Configure H.323 Settings
•Configure SIP Settings
▪Configure SVC Call Settings
▪Provisioning the System
•Importing and Exporting System Settings
•Logs
There are different deployment options for your phone, which may affect the privacy options and
supporting requirements described in this guide. These details apply specifically to a phone deployed in a
customer premises and managed by the customer.
Call Detail Report (CDR)
The Call Detail Report (CDR) feature keeps a record of every incoming, outgoing, and missed call that
occurs on the system. The Call Detail Report in Poly G200 system only includes the basic call
information: time and call number. It can be viewed from the local user interface and the system web
interface.
The CDR is not downloadable in the first release.
The CDR database is limited to the most recent 150 entries. Entries are automatically deleted by the
system (oldest first) when the system reaches the entries limit. These entries cannot be deleted manually,
neither from the user interface nor from the API.
The CDR is enabled as default. There is no user interface to enable or disable CDR feature.
Related Links
Right to Access on page 15
Configure H.323 Settings on page 7
Configure SIP Settings on page 8
Configure SVC Call Settings on page 9
Add, Edit, or Delete Contacts on page 5
4
View Recent Calls List
You can display recent calls on the Place a Call page in the system web interface.
The recent calls list includes the following information:
▪Call number
▪If the call was placed or received
▪Date and time
Procedure
» Do one of the following:
▪In the system web interface, go to Place a Call > Recent Calls.
▪In the local interface, go to Place a Call > Recent.
Change the Password
You can change the G200 system admin password from the system web interface.
Privacy-Related Options
Poly recommends that only administrators access the Poly G200 system configuration. Therefore, Poly
provides only one credential for the system web interface.
Procedure
1. Go to Admin Settings > Password.
2. Configure the following settings and select Submit.
SettingDescription
Old PasswordSpecifies the existing password for the administrator account used when
logging in through the system web interface. When creating a password for the
first time, leave this setting blank.
New PasswordSpecifies a new password.
The password is case sensitive and must be less than 40 characters without
spaces.
Confirm PasswordConfirms the new password.
Related Links
Right to Rectification on page 16
Add, Edit, or Delete Contacts
You can add, edit, and delete contact information from the G200 system web interface.
You can manage up to 1000 contacts. The contact information only includes name and number, IP
address, or SIP URL.
5
Privacy-Related Options
Procedure
1. In the system web interface, go to Contacts.
2. Do one of the following:
▪Click Add Contact and enter contact information.
▪Click Edit Contact to modify the contact.
▪Click Delete Contact to delete the contact.
Related Links
Right to Access on page 15
Call Detail Report (CDR) on page 4
Right to Data Portability on page 16
Importing and Exporting System Settings on page 13
Right to Erasure
Right to Rectification on page 16
Import Directory Contacts
You can import directory contacts to your G200 system from the system web interface.
Make sure the system isn’t in a call when you begin the import.
Note the following when importing directory contacts:
•The size of the uploaded CSV file can’t exceed 100 kilobytes.
•The number of contacts in the file must be less than 1000.
•When the uploaded CSV file includes entries already on your G200 system, the system deletes the
duplicate files.
Procedure
1. In the system web interface, go to Contacts and select Import Contacts.
2. In the dialog box, select the directory.csv file you want to import and select Open.
3. Select Import to upload the directory.csv file to the G200 system.
Export Directory Contacts
You can export directory contacts from the G200 system web interface to local devices, such as
computers and tablets, in CSV file format.
Make sure the system isn’t in a call when you begin the export.
Procedure
1. In the system web interface, go to Contacts and select Export Contacts
2. Save the downloaded directory.csv file on your local device.
.
6
Privacy-Related Options
Configure Deployment Mode
You can manually configure the deployment mode from the system user interface.
You can't configure the deployment mode when the G200 system is in a call, sharing content, or
upgrading the camera.
Procedure
1. In the system web interface, go to System Settings > Deployment Mode.
2. Choose the mode from the drop-down list and select Submit.
Note: The system automatically reboots to apply the change.
Configure H.323 Settings
If your network uses a gatekeeper, the G200 system can register its H.323 name and extension. This
enables others to call the system by entering the H.323 name or extension instead of the IP address.
The following settings are only available for AVC mode.
Procedure
1. In the system web interface, go to Server Settings > Call Server.
2. Configure the following settings and select Submit.
SettingDescription
Communication
Protocol
Enable H.323
Registration
Gatekeeper AddressGatekeeper address that the network is using.
H.323 NameSpecifies the name that gatekeepers and gateways use to identify this system.
H.323 Extension (E.
164) (My Number)
Specifies the registrar protocol. Select H.323.
Enables you to display and configure the H.323 settings.
You can make point-to-point calls using H.323 names if both systems are
registered to a gatekeeper.
Enables users to place point-to-point calls using the extension if both systems
are registered with a gatekeeper, and specifies the extension that gatekeepers
and gateways use to identify this system.
Your organization's dial plan might define the extensions you can use.
Require AuthenticationEnables support for H.235 Authentication.
When H.235 Authentication is enabled, the H.323 gatekeeper ensures that
only trusted H.323 endpoints are allowed to access the gatekeeper.
This setting is available when Enable H.323 Registration is set to Enable.
7
Privacy-Related Options
SettingDescription
User NameWhen authentication is required, specifies the user name for authentication
with H.235.
PasswordWhen authentication is required, specifies the password for authentication with
H.235.
Related Links
Right to Access on page 15
Call Detail Report (CDR) on page 4
Configure SIP Settings
If your network supports SIP, you can use SIP to connect IP calls.
The SIP protocol has been widely adapted for voice over IP communications and basic video
conferencing; however, many of the video conferencing capabilities are not yet standardized. Many
capabilities also depend on the SIP server.
The following settings are only available for AVC mode.
Procedure
1. In the system web interface, go to Server Settings > Call Server.
2. Configure the following settings and select Submit.
SettingDescription
Communication
Protocol
Transport ProtocolIndicates the protocol the system uses for SIP signaling.
Enable SIP RegistrationEnables you to configure the SIP settings.
Server AddressSpecifies the DNS FQDN or IP address of the SIP proxy server. By default for
Specifies the registrar protocol. Select SIP.
The SIP network infrastructure your G200 system operates within determines
which protocol is required.
•TCP: Provides reliable transport via TCP for SIP signaling.
•UDP: Provides best-effort transport via UDP for SIP signaling.
•TLS: Provides secure communication of the SIP signaling. TLS is available
only when the system is registered with a SIP server that supports TLS.
When you choose this setting, the system ignores TCP/UDP port 5060.
Select TLS if you want to encrypt AVC calls.
TCP, the SIP signaling is sent to port 5060 on the proxy server. By default for
TLS, the SIP signaling is sent to port 5061 on the proxy server.
DomainSpecifies the domain of the SIP proxy server.
8
SettingDescription
Privacy-Related Options
SIP Address (My
Number)
User NameSpecifies the user name to use for authentication when registering with a SIP
PasswordSpecifies the password associated with the user name used to authenticate
Specifies the SIP address or SIP name of the system, for example,
mary.smith@department.company.com. If you leave this field blank,
the system’s IP address is used for authentication.
proxy server, for example, marySmith. If the SIP proxy server requires
authentication, this field and the password cannot be blank.
the system to the proxy server. The password can be up to 47 characters in
length.
Related Links
Right to Access on page 15
Call Detail Report (CDR) on page 4
Configure SVC Call Settings
If you use SVC mode, use the Poly RealPresence Clariti Ensemble server as the call server.
Make sure to enable SVC deployment mode.
Procedure
1. In the system web interface, go to Server Settings > Call Server.
2. Configure the following settings and select Submit.
SettingDescription
Device NameSpecifies the name of your G200 system registered to the RealPresence Clariti
Ensemble server.
Note: To avoid duplicate device names, you must change the default device
name.
Server AddressSpecifies the RealPresence Clariti Ensemble server you want to use.
Note: If the RealPresence Clariti Ensemble server doesn’t use the default
FQDN/IP port 443, you must specify the port in the server address as
<ip>:<port>. For example: 10.11.12.13:446.
User Name
Password
Specifies the user name and password that register the system to the
RealPresence Clariti Ensemble server. Since RealPresence Clariti Ensemble
1.1, the default user name and password are both defProvAccount.
Note: Refer to the Poly RealPresence Clariti Ensemble Administrator Guide
for more information.
9
Privacy-Related Options
Related Links
Right to Access on page 15
Call Detail Report (CDR) on page 4
Provisioning the System
You can manage G200 systems in dynamic management mode.
In dynamic management mode, the following might be true:
▪The Server Address, User Name, and Password fields are populated on the Provisioning
screen.
▪Configuration settings that are provisioned, or that are dependent on provisioned values, are hidden
on the G200 system.
▪A provisioning service system administrator can upload a provisioned bundle from an already
configured G200 system. When G200 systems request provisioning, the system downloads the
provisioned bundle and any automatic settings. A G200 system user with administrative rights can
change the settings on the G200 system after the provisioned bundle is applied. If you later
download a new provisioned bundle from the provisioning service, the new bundle overwrites the
manual settings.
▪If the system has previously registered successfully with a provisioning service but fails to detect
the service when it restarts or checks for updates, an alert appears on the Status screen. The
G200 system doesn't store the GK/SIP register related information if the provisioning service
connection is lost before reboot.
Create a Provisioning Profile
To provision the G200 system, you must create a G200 provisioning profile on the provisioning server.
Procedure
1. Get the provisioning template file from Poly Online Support Center. The file name is
G200_Provisioning_Template.cfg.
2. Get the provisioning template file from your Poly distributor. The file name is
G200_Provisioning_Template.cfg.
3. Rename the provisioning template file using the MAC address of the G200 system:
<macaddress>_profile.cfg.
4. Depending on your deployment’s security settings, go to ftp://<ipaddress>/<filepath> or
ftps://<ipaddress>/<filepath>.
5. Copy the <macaddress>_profile.cfg file to the provisioning server.
Automatically Configure a Provisioning Service
When the G200 system powers on, the system can automatically detect a provisioning service by reading
the address of the provisioning server through DHCP.
Depending on your deployment’s security settings, configure DHCP to return the provisioning server
addresses as ftp://<user>:<password>@<ipaddress>/<filepath> or ftps://user:<password>@<ipaddress>/<filepath>.
10
Privacy-Related Options
Procedure
1. In the system web interface, go to Server Settings > Provisioning.
2. Select Auto from the drop-down list.
3. From the DHCP Server Option drop-down menu, choose one of the following:
▪Default: The default value is 66.
▪Custom: Enter a custom DHCP value. The system uses this value to read the provisioning
server address through DHCP.
G200 supports the following four Custom values: 66, 67, 150, and 160.
Manually Configure a Provisioning Service
You can configure the G200 system provisioning settings on the system web interface.
If you enable automatic provisioning but the system doesn’t successfully register with the provisioning
service, you might need to change the User Name, Password, or Server Address used for registration.
For example, users might be required to periodically reset passwords they use to log in to the network
from a computer. If your system also uses this network password as the provisioning service password,
you must update it on the Poly G200 system.
To avoid unintentionally locking a user out of network access, G200 systems don’t automatically retry
registration until you update the settings and manually register on the Provisioning page.
Procedure
1. In the system web interface, go to Server Settings > Provisioning.
2. Select Manual from the Provisioning Mode drop-down list.
3. Configure the following settings and select Submit.
Note: You can register multiple Poly G200 systems to a single user.
SettingDescription
Protocol TypeSpecifies the type of provisioning server.
Server AddressSpecifies the address of the system running the provisioning service. Enter
<ipaddress>/<filepath> for FTP or FTPS, or enter the IP address for
RealPresence Resource Manager.
User NameSpecifies the endpoint's user name for registering to the provisioning service.
The user name cannot contain "@" and ":".
PasswordSpecifies the password that registers the system to the provisioning service.
The password cannot contain "@" and ":".
Provision the Deployment Mode
You can provision the deployment mode of your G200 system through the system’s provisioning profile.
Three parameters determine which deployment mode the system uses. When you enable more than one
parameters, the parameter priority applies in the following order:
▪enableH323
11
▪enableSIP
▪enableSVC
Procedure
1. Open your system’s provisioning profile.
2. Based on the deployment mode you want to use, enable the following parameters:
▪AVC mode (enable either parameter):
◦enableH323
◦enableSIP
▪SVC mode:
◦enableSVC
Enable LDAP Support
You can provision G200 1.3.x to enable LDAP features in AVC mode.
The current LDAP features include:
▪Provisioning via FTP/FTPS servers
▪LDAP searches (50 results at most)
▪SIP and H.323 calls with LDAP contacts
▪LDAP status
Privacy-Related Options
Note: G200 1.3.x doesn’t support the Polycom RealPresence Resource Manager LDAP server.
Procedure
» In your provisioning profile configure the following parameters:
▪serverAddressH350
▪ldapUsername
▪ldapPassword
▪baseDNPerson
▪attributeDisplayName
▪attributeSIPURI
▪maxResultSetSize
The following example shows how to provision the LDAP features:
You can disable the provisioning service in the system web interface.
Procedure
1. In the system web interface, go to Server Settings > Provisioning.
2. Choose Disable from the drop-down list.
Importing and Exporting System Settings
You can export existing G200 system settings to local devices, such as computers or tablets, in .cfg
format.
You can also import system web interface settings from a device to a G200 system to enable quick
manual configuration.
Related Links
Right to Data Portability on page 16
Add, Edit, or Delete Contacts on page 5
Download Logs on page 14
Import System Settings
You can import G200 system settings from the system web interface.
Procedure
1. In the system web interface, go to System Settings > Import and Export Configuration.
2. Select Choose File and select a .cfg file to import.
3. Select Import to upload the .cfg file to the G200 system.
The G200 system restarts after the file successfully imports.
Export System Settings
You can export G200 settings from the system web interface.
Procedure
1. In the system web interface, go to System Settings > Import and Export Configuration.
2. Select Export and save the downloaded .cfg file to your system.
13
Privacy-Related Options
Logs
Logs contain information about system activities and configurations to help you troubleshoot issues.
Enable or Disable Logs
You can choose whether to enable or disable the system logs of your G200 system.
Procedure
1. In the system web interface, go to Diagnostics > System Logs.
2. Do one of the following:
•To enable system logging, select the Enable Logging check box.
•To disable system logging, clear the Enable Logging check box.
Note: The change takes effect immediately, but resets to default (disabled) after the next reboot.
3. Select Submit.
Download Logs
You can download the system logs of your G200 system.
The date and time of the log entries display in GMT.
Note: You must use the serial number of your system to open the log file because it’s encrypted.
Procedure
1. In the system web interface, go to Diagnostics > System Logs.
2. Select Export.
The Poly_G200_<SN>_<time>.tar.gz.enc file downloads to your local drive.
Related Links
Right to Data Portability on page 16
Importing and Exporting System Settings on page 13
14
How Data Subject Rights Are Supported
Topics:
▪Right to Access
▪Right to Be Informed
▪Right to Data Portability
▪Right to Erasure
▪Right to Rectification
The following information shows how data subject rights are supported.
Right to Access
A data subject has the right to view and/or obtain a copy of all personal data for a specific data subject.
Personal data about specific participants in conferences can be viewed.
A copy of any personal data made available to Poly when working with Poly support is available by
requesting it from your Poly support representative.
Related Links
Call Detail Report (CDR) on page 4
Configure H.323 Settings on page 7
Configure SIP Settings on page 8
Configure SVC Call Settings on page 9
Add, Edit, or Delete Contacts on page 5
Right to Be Informed
What personal data is collected?
See Purposes of Processing Personal Data on page 17.
How is personal data is used?
See Purposes of Processing Personal Data on page 17.
How long is personal data kept?
Any personal data made available when working with Poly support, specific to a support incident, is
retained until the information is requested to be removed by the customer.
Is personal data shared with any third parties and if so, who?
If personal data is made available when working with Poly support, this data may be shared with Poly’s
engineering team (which may include 3rd parties/contractors).
How can a data subject be notified of a data breach?
15
How Data Subject Rights Are Supported
Data Subjects have a right to be notified when their data has been processed without authorization. The
product administrator is able to monitor and identify when certain security anomalies have occurred.
Right to Data Portability
A data subject has the right to receive a copy of all personal data in a commonly-used, machine-readable
format.
▪The address book can be exported in CSV format.
▪Audit and log files can be downloaded in plain text format.
▪Web user interface configured file can be downloaded in plain text format.
Related Links
Importing and Exporting System Settings on page 13
Download Logs on page 14
Add, Edit, or Delete Contacts on page 5
Right to Erasure
A data subject has the right to remove all of his or her own personal data.
For details on how to erase customer personal data from the system, see How Personal Data Is Deleted
on page 20.
Any personal data made available when working with Poly support, specific to a support incident, is
retained until the information is requested to be removed by the customer.
Right to Rectification
Personal data about specific participants in conferences cannot be edited or updated because the
information derives from the device of origin.
Personal data related to users who are Administrators, Operators and Auditors can be edited or updated
using RMX Manager or RealPresence Resource Manager (if configured). See the User Management
section in this guide.
Polycom does not manipulate data made available during the support process, so any rectification of
inaccuracies of personal data must be performed by customer directly.
Related Links
Add, Edit, or Delete Contacts on page 5
Change the Password on page 5
16
Purposes of Processing Personal Data
Purposes for Processing Personal Data
CategoryType of Personal DataPurpose of
Processing
Call Detail Records
(CDR)
Directory/Address
Book
Administrator and user
credentials
Device information
The following information for near
and far endpoints:
▪System name
▪Call number (IP or SIP address
or ISDN number)
▪Contact name
▪IP address
▪SIP address
▪Alias name (H.323 only)
PasswordLogin and
▪Device name
▪MAC address
▪IP address
▪SIP address
▪H.323 alias name
▪Serial number
▪Maintaining call
history
▪Troubleshooting
call errors or
performance
issues
▪Ease of use for
dialing participant
▪Store frequently
used information
authentication
Endpoint management
Interface Type
▪User interface
▪Web interface
▪User interface
▪Web interface
Web interface
▪User interface
▪Web interface
Audit and system log
files
▪Admin and user credentials
(excluding passwords)
▪Admin and user actions
▪Endpoint call status and usage
data
▪System troubleshooting details
▪Admin and user
activity logging
▪Maintain history of
configuration
changes
▪Troubleshooting
system issues
Web interface
17
Purposes of Processing Personal Data
CategoryType of Personal DataPurpose of
Processing
Configuration files
Poly_G200_config.cfg (for
local import or export):
▪backupSystemname
▪dateAndTimeSettings
▪h323Settings:displayName
▪e164number
▪h323AuthName
▪h323AuthPassword
▪h323alias
▪username
▪sipSettings:authorizationName
▪svcPassword
▪svcUserName
▪Provisioning
▪Import and export
system settings
G200_Provisioning_Templ
ate_FTP.cfg:
▪displayName
▪timeZone
▪e164Number
▪h323alias
▪h323AuthName
▪h323AuthPassword
▪SIP authorizationName
▪SIP user credentials
▪SIP URI
▪Admin credentials for
provisioning service
▪ldapUsername
▪ldapPassword
G200_Provisioning_Templ
ate_RPRM.cfg:
▪H323.e164Number
▪H323.h323AuthName
▪H323.h323AuthPassword
▪H323.h323alias
▪SIP.authorizationName
▪SIP.password
▪SIP.userName
▪dateTime.timeZone
▪general.displayName
▪svcSettings.svcUserName
Interface Type
▪Polycom
RealPresence
Resource Manager
▪Web interface
18
How Administrators Are Informed of Any
Security Anomalies (Including Data
Breaches)
How Administrators Are Informed of Any Security Anomalies
Security Anomaly TypeWhere to CheckRecommended Frequency to
Check
All active alarmsRefer to the Related Links of this
topic.
The alarms are checked every 3
sec. If there is new alarm, the alarm
list is updated with new list of
alarms. Recommend log review
once daily.
19
How Personal Data Is Deleted
Topics:
•Reset Your G200 System
▪Factory Restore Your System
How Customer Personal Data Is Deleted
Data TypeSteps to DeleteDeletion Method
Contacts
Audit and System log files
▪Contacts can be deleted by
performing a comprehensive
restore operation.
▪Contacts can also be deleted
one by one on system web
interface.
▪Audit and log files are
automatically deleted by the
system (oldest first) when the
system reaches the auditor
event file limit of 30MB. These
settings can be configured by
the device administrator.
▪Audit and log files are also
deleted by performing a
comprehensive restore
operation.
Simple delete from database.
File delete with overwrite.
Reset Your G200 System
If your G200 system isn’t functioning correctly or you forgot the password, you can reset the system.
This procedure effectively refreshes your system, deleting all settings except the current software version.
The G200 system restore button pinhole is located on the back of the system, as displayed in the
following figure:
You can also reset the system from the system web interface from Admin Settings > Factory Reset.
20
How Personal Data Is Deleted
Procedure
1. Using the paper clip, press and hold the restore button.
2. In the system web interface, go to Admin Settings > Factory Reset and click Reset.
After about 15 seconds, the system restarts and displays the setup wizard.
Related Links
Right to Erasure
Factory Restore Your System
A factory restore completely erases the system’s flash memory and restores the system to the software
version and default configuration stored in its factory partition.
A factory restore deletes the following items:
▪Software updates
▪Contacts
▪System configurations
▪Logs
Procedure
1. Power off the system.
2. Straighten a paper clip and insert it into the reset pinhole.
3. Press and hold the restore button while powering on the system.
4. After the screen shows that system enters the update process, release the reset button.
The system restarts automatically when the process is complete.
Related Links
Right to Erasure
21
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.