Information We Collect
1.1 Website & Account Information
- Account Information: Email address, password (hashed with PBKDF2-SHA512, 600,000 iterations per OWASP guidance), first and last name, and any profile details you provide when creating an account.
- Two-Factor Authentication: If you enable 2FA, the TOTP secret is stored alongside your account so the portal can verify codes from your authenticator app.
- Transaction Data: Purchase history, subscription status, and a Stripe customer/subscription identifier. Card numbers and full billing details are held by Stripe — we never see or store them.
- Support Communications: Support ticket content, attachments, and any email correspondence you send us.
- Server Access Logs: Standard HTTP access logs (IP, user-agent, request path, timestamp) generated by the web server for security and abuse prevention.
1.2 PNT-RMMS Desktop Client Data
When you install and use the PNT-RMMS Agent, the following data is reported to our servers:
- Hardware Inventory: Computer hostname, system manufacturer, model, serial number, CPU name and core count, total RAM, and per-drive storage details.
- OS & Runtime State: Windows edition / build / architecture, last boot time, time-zone, domain-join status, current CPU and memory utilization, free disk space, and the agent's version number.
- Network Data: Primary network adapter MAC address (used as a hardware fingerprint for license deduplication) and the public IP address the device most recently reported from. Local IPs and other interface addresses are not reported.
- Agent Metadata: Encrypted device token (DPAPI-protected on disk under a per-machine key) and license-validation state.
- Diagnostic Logs: Warning-level and above logs from the Agent are forwarded to the portal for centralized troubleshooting. Personal data is not included in diagnostic logs.
- Remote Session Summaries (v1.4.17+): At the end of each remote-control session the Agent posts a summary containing start/end timestamps, the connection path that won (LAN-direct, direct over WAN, or relay), bytes transmitted on each path, and the public IP of the operator. No screen content or input is stored — only the path and byte totals.
1.3 Remote Access Session Data
When a remote-control session is initiated, the following is captured:
- Session Metadata: Start/end timestamps, the operator's identity, the path that connected the session (LAN-direct, direct over WAN, or relay), and per-session bytes transmitted.
- Screen Content: Screen frames are transmitted in real time to the connected operator's browser. All transit is encrypted — direct WebRTC connections use DTLS-SRTP, and relayed connections use TLS over WSS. Screen content is not stored on our servers; only the byte counts and connection path are persisted.
- Audit Logs: Authentication events (account login, MFA enrollment, role changes), subscription changes, and device activations are logged on the portal for security and compliance review.
1.4 Peer-to-Peer Connection Data
PNT-RMMS prefers direct connections over WebRTC and only falls back to relay when direct fails:
- STUN candidate gathering: Your device contacts our self-hosted STUN server (
stun:rmms.pronovatech.com:3478), with Cloudflare and Google STUN as fallbacks if our server is unreachable. STUN reveals the device's public IP and port to itself; no session content flows over STUN. - mDNS resolution (v1.4.17+): When the operator's browser is on the same local network as the device, the Agent resolves browser-emitted
.localhostnames via standard multicast DNS (UDP 5353) so the connection can stay on the LAN. mDNS queries never leave the local broadcast domain. - Relay fallback: When direct cannot be established, sessions traverse our PNT-operated relay servers over TLS-encrypted WebSockets. We do not operate or use third-party TURN servers. Relayed traffic is forwarded in flight and is not recorded.
1.5 RMMS Portal Data
If you use the portal to manage your company and devices, we also store:
- Company name, address (if provided), and organizational structure (locations, device groups).
- Team-member invitations, role assignments (Owner / Member / Viewer), and join history.
- Per-device assignment metadata (which user activated which device, when).