This page explains what TSC collects, why we collect it, how long it stays, and what guardrails apply when AI is involved.
| What we collect | Why we collect it |
|---|---|
| Device health data such as patches, disk, CPU, and memory | So we can catch issues early and fix them before they interrupt your work. |
| Network logs and DNS activity | To spot threats, diagnose outages, and monitor performance. |
| Browser telemetry when you use TSC Connect Browser | To enforce policy, reduce risk, and block known malicious behavior. |
| Support tickets and remote session records | To deliver support, review what happened, and improve future response. |
| Security scan results and posture checks | To measure progress over time and prioritize what should be fixed first. |
TSC does not sell, rent, or trade client data. Your information is used to operate your services, secure your environment, and improve the platform that supports those services.
AI is used to monitor, recommend, summarize, and in some cases trigger approved operational actions. Those actions are logged and can be reviewed by a human at TSC.
TSC does not allow generative AI to make billing, termination, or legal decisions without human review and approval.
The platform can learn from anonymized patterns across the fleet so it gets better at identifying threats and recurring problems. Your organization-specific details stay tied to your environment.
TSC protects collected data with encryption in transit and at rest, role-based access controls, audit logging, and ongoing reviews of the infrastructure that stores and processes that data.