Security and Privacy in Remote Support
Understanding the remote support security measures and privacy protections implemented during remote computer support sessions can help you feel confident about the process.
Connection Security
Remote support sessions utilize multiple layers of security:
• 256-bit AES encryption for all data transfers
• Unique session codes for each connection
• Two-factor authentication options
• Secure socket layer (SSL) protocols
• Automatic session timeouts for inactivity
These security measures are similar to those used by online banking systems.
User Control Features
Screen Visibility
See everything happening on your screen during the session. No hidden actions or background processes.
Session Control
End the session instantly at any time. Once terminated, the technician cannot regain access without your permission.
Access Permissions
Grant or revoke access to specific areas of your computer. Maintain control over what the technician can and cannot access.
Data Protection Measures
Remote support platforms implement various data protection features:
• No permanent software installation required
• Temporary access that expires after session end
• No data storage on external servers
• Encrypted file transfers when necessary
• Secure deletion of temporary session files
These measures ensure your personal information remains protected throughout the support process.
Privacy Policies
Standard privacy protections include:
• Confidentiality agreements
• No recording without consent
• Clear documentation of all actions taken
• Strict data handling procedures
• Regular security audits and updates
These policies ensure compliance with industry standards and regulations.
Before Starting a Session
To ensure maximum security during remote support:
• Close sensitive applications like banking software
• Log out of personal accounts if not relevant to the issue
• Save and close any confidential documents
• Inform the technician about areas that should not be accessed
• Verify the connection is secure before proceeding
These precautions help maintain your privacy during the support session.
After the Session
Post-session security measures include:
• Automatic removal of temporary access files
• Session logs for your records
• Confirmation of connection termination
• Option to change passwords if accessed during support
• Verification that all remote access tools are closed
These steps ensure no residual access remains after support concludes.
