DataStoragePolicy

Version 8 (Adrian Georgescu, 06/04/2013 01:17 pm) → Version 9/52 (Adrian Georgescu, 06/04/2013 01:21 pm)

h1. SIP2SIP Data Privacy and Storage Policy

SIP2SIP server infrastructure relays and stores information provided by end users. If you are concerned about privacy of your own data and how it is used inside the platform, read below.

h2. SIP Accounts

Accounts information is stored in the platform database. SIP account and SIP Settings web page passwords are stored in encrypted form in the database. There is a salt involved but in case of database being compromised the salt can be also retrieved. It is advisable to use strong passwords that cannot be guessed by dictionary brute force attacks.

h2. SIP Signaling

Signaling can be done in clear text using UDP and TCP protocols. You may use TLS for encrypting data between the end points and platform SIP servers. There is no guarantee that encryption will work end-to-end, the SIP signaling part of the platform provides only hop-by-hop signaling security.

h3. Sessions h2. SIP Traces

All SIP signaling for session establishment relayed by the platform SIP servers is stored in cleartext for the last 30 days in platform databases. Both end-users and platform operator has access to this information for troubleshooting purposes.

h3. Registration

No information is stored in the platform.

h3. Presence

Subscribe/Notify dialogs and related presence payloads are not stored in the server databases.

h2. Call Detail Records

Call Details Records are stored for up to six months in clear text format in platform databases.

h2. Offline Short Messaging

Messages sent using SIP MESSAGE method that cannot be delivered to local users of the platform are stored for later delivery in cleartext format in the platform database.

h2. RTP Media Audio and Video

RTP streams are relayed by platform media relays. Actual data is not stored or copied anywhere. You may encrypt your data using sRTP but the encryption key is available in the signaling. Whomever has access to the signaling can potentially be able to decrypt any sRTP encrypted stream. If your end-points supports zRTP, the key is known only by the clients.

h2. MSRP Media

h3.
Chat Messages

MSRP chat sessions are done over TLS connections via the platform MSRP relay servers. The content of the messages is not logged or stored anywhere.

Blink users can replicate the chat messages between multiple instances configured with the same account. The replicated chat messages are stored for 60 days in encrypted form in platform databases. The encryption key is not known by the server, only Blink clients posses the encryption and decryption key. If you are concerned about privacy you may disable chat replication in Blink.

h3. h2. File Transfers

MSRP file transfer sessions are done over TLS connections via the platform MSRP relay servers. The content of the files is not logged or stored anywhere.

h2. XMPP Gateway

All chat messages and presence payloads are relayed through the SIP/XMPP gateway. Message content is not stored anywhere.

h2. Protecting Privacy

To protect your data against being exposed over the Internet, do the following:

* Use TLS for SIP signaling
* Use zRTP for audio and video media if your end-points support it otherwise use sRTP
* Use TLS for MSRP media