What Data is analyzed
Pavooq employs advanced algorithms to calculate the strength of relationships within an organization in real-time. This process results in a robust set of analytics, reports, and visualizations that provide valuable insights into various aspects of organizational functioning, such as:
The management of customer relationships
The functioning and collaboration of teams and departments
The identification of inappropriate relationships and communications
The management of data loss and leakage.
The data used to generate these insights is obtained from the organization's communication system, utilizing various methods that are tailored to the specific system in use, with the goal of minimizing the information to the essential "meta-data" required for system operation.
Data used by Pavooq
Data obtained by from the source system and stored by Pavooq consists of
Data | Required | Use |
---|---|---|
Message size or duration | Yes | To build timelines and detect duplicates |
Message type | Yes | Data consists of senders identifier, required to build relationships |
Message id | Yes | Data consists of senders identifier, required to build relationships |
Message direction | Yes | Inbound, outbound or internal direction will be determined. Required to build the relationship map |
Recipients/Destination | Yes | System id for message, required to detect duplicates and for potential integrations back into originating system (for example, to open an archived copy of a message from a archive system) |
Sender/Originator | Yes | Messages are classified as personal, group, or multiple-recipient indictating the weight of the message |
Timestamp | Optional collected by default | Used by analytics system to determine facts such as the likelihood of messages containig attachments. |
How it is collected and stored
At our company, we understand the importance of protecting our customers' personal data. That's why we go above and beyond to implement comprehensive measures that safeguard this information:
We only collect the bare minimum of data needed to achieve our legitimate business objectives, and never participate in any form of data trading.
The functioning and collaboration of teams anWe are always transparent about our data practices.d departments
We use automated techniques to ensure data accuracy and timeliness and employ appropriate security protocols for all personal and confidential information.
We also work with our customers to help them implement these same standards.