Privacy & security under company control

BlueChatCal protect the privacy of your business information.

Your company keeps control of events

  • its information

as well as

  • its participants

all along its life cycles in the Business Process and even after in the legal archiving

Users under your control

 Only the ChatCal Pro version can create professional event, using your professional mail address. 

As organization, you assign your collaborators the right to create event on your behalf ,(as you provide your employee with an email address to send email address on your behalf). When they create an event they are owner and responsible of its active security.

You can

  • allocate ChatCal Pro license to your employees
  • suspend his right for a period of time 
  • revoke this right
  • re-allocate ChatCal Pro licenses to other employees

If someone uses fraudulently your professional mail address to create an event (as he is not entitled to), your security officer is warned, of course the event is blocked.

Event active control.

Event under active control of its rersponsible

As event responsible, the owner controls the information as well as the participants to an event, thus performing an active security on the event.

The event owner creates an event and:

Manage participants

  • Invite person to participate with predefined role
  • Manage the participants and their role
  • Modify participant role if necessary
  • Control participating devices location, consequently check for “man in the middle” risk
  • Ban an indelicate participant, that provoke a secure deletion of the event and its information in all his devices

Manage information

Evenif he cannot delete any information to ensure integrity of the event, he can

  • Transfer information and documents to participants
  • Control and moderate the contributions and avoid inappropriate diffusion of information
  • Propose like, rating or organize voting
  • Manage life cycles of the event 
  • Manage mobile rights of new information
  • Export and import information under control and traceability

Risks under control of security officer

Tap to view active security and privacy design

Reduce cybercriminality risks and improve internal security

The security officer can control possible risk to information leaks, intrusion and potentially risky actions. In fighting cyber criminality, BlueChatCal philosophy is to permit scam tracking and of course to quarantine fraudulent events.

  • BlueChatCal is not physically connected to your IS network. BlueChatCal acts as a server in your DMZ.  Firewalls and conventional protection  isolate BlueChatCal and your IS.
  • The light integration is realized using message queuing system (MQS) that permit to the security officer to control suspicious content, The QMS permit also to implement a “Check Before Process” policy that may secure the internal following IS “Straigh Through Processing”
  • Export of information, when an owner export a document out of an event, BlueSafe trace this export for traceability reason
  • Fraudulent creation of events is quarantined and reported to the security officer for a action
  • Checking possible duplicate locations participation is quarantined and might reveal either lack of training or a possible “Man in the Middle” type of fraud
  • The settling pond keeps the suspicious synchronization messages out of your IS network. Digging into it might reveal possible attempts of attacks. This pond might be a treasury chest for the security officer who can explore off-line and securely its content. 

Information under Audit control

Tap to view BlueSafe archiving services

Traceability and integrity

Once the event safely archived in the BlueSafe, Legal Department, inspectorate and auditors keep control of information.

Record Management

  • the Blue Safe stores the information of your enterprise, all events and their content are  saved progressively in the records management
  • Retrieve who has participated to which event and how he contributes to the event.
  • Control the progress of a dossier all along its business process. Find and manage bottleneck.
  • Keep context of a decision. After months or years, taking over the preceding collaborator, it might be difficult to understand why and how they took this decision. BlueSafe keeps the context of a decision
  • Archive classification: as collaborators of different departments of  company you can file and classify the events and their document in different manner
  • Filing plan: legal department can decide on a filing plan with authorized access, cutoff dates and duration of retention compliant with regulations
  • Freeze record: upon suspicion the legal department can freeze sets of records for a limited time, in order to track fraudulent access and permit investigation (including view of the nominative vote). This record set can be open to both internal and external investigators.

As event responsible, you keep control of its participants and its information, all along its lifecycles