Data at rest is stored un-encrypted. From a security perspective, access to any data item is always handled through a service, for example, a service to request the sensor names of particular machine. This service will only act if the request passes ...
Admin users have the ability to manage all other users in their company. This includes inviting new users, changing their privacy settings, and adding admin users. But it also includes blocking and deleting other users which we will explain in this ...