Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How is security maintained?

maintained security
0
10 Posted

How is security maintained?

0

At the beginning of a screen-sharing session, you and your iCONECT representative are connected via a communication server. The screen data that is passed between you and your representative during a session is highly compressed using proprietary technology that can be viewed only with GoToAssist software. This data is also encrypted using 128-bit Advanced Encryption Standard (AES) encryption. Privacy principles are TRUSTe compliant. After the session has ended, your representative can no longer see your screen or access your computer.

0
10

At the beginning of a screen-sharing session, you and your support representative are connected via a communication server. The screen data that is passed between you and your support representative during a session is highly compressed using proprietary technology that can be viewed only with GoToAssist software. This data is also encrypted using 128-bit Advanced Encryption Standard (AES) encryption. Privacy principles are TRUSTe compliant. After the session has ended, your support representative can no longer see your screen or access your computer unless you make another explicit request for support.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123