Contents
Before You Begin ..............................................................................................................................................................................................3
Related Poly and Partner Resources .....................................................................................................................................................3
Privacy-Related Options ................................................................................................................................................................................4
Download Log Files for the Poly TC10 ................................................................................................................................................. 4
Purposes of Processing Personal Data .................................................................................................................................................4
How Administrators Are Informed of Any Security Anomalies (Including Data Breaches) ................................................. 4
How Data Subject Rights Are Supported .................................................................................................................................................. 5
Right to Access ............................................................................................................................................................................................ 5
Right to Be Informed ..................................................................................................................................................................................5
Right to Data Portability ...........................................................................................................................................................................5
Right to Erasure ...........................................................................................................................................................................................5
Right to Rectification ................................................................................................................................................................................. 5
Right to Object to Processing ..................................................................................................................................................................5
Right to Restrict Processing .................................................................................................................................................................... 5
How Personal Data Is Deleted ..................................................................................................................................................................... 6
Factory Reset the
Poly TC10
...................................................................................................................................................................6
Factory Restore the Poly TC10 in the UI ............................................................................................................................................. 6
ii