Do you capture device information (e.g., IP address, MAC address)?
Explanation
Guidance
Device information can be captured for a variety of reasons, from analytics to marketing to network management and security. It is important to know the details in order to be clear on the privacy implications.
Example Responses
Example Response 1
Yes, our application captures and logs IP addresses as part of our standard security practices We collect this information for several purposes: (1) to detect and prevent fraudulent access attempts, (2) to troubleshoot connectivity issues, and (3) to comply with legal requirements for audit trails We do not collect MAC addresses IP addresses are stored in encrypted log files for 90 days, after which they are automatically purged This collection is disclosed in our privacy policy, and we have implemented access controls to ensure only authorized security personnel can view this information We do not use IP addresses for marketing purposes or share them with third parties except when legally required.
Example Response 2
Yes, we capture both IP addresses and MAC addresses for devices connecting to our service IP addresses are collected for all users and stored for 12 months for security monitoring and fraud prevention MAC addresses are only collected for corporate-owned devices as part of our mobile device management (MDM) solution to ensure only authorized devices can access sensitive corporate resources All device information is stored in our encrypted database with strict access controls Users are informed about this collection in our privacy notice, and they can request information about their stored data through our privacy portal We implement data minimization principles and only use this information for the stated security purposes.
Example Response 3
No, our application does not currently capture or store device information such as IP addresses or MAC addresses While this might limit some security capabilities like detecting suspicious login patterns or enforcing location-based access controls, we've made this design choice to enhance user privacy Instead, we rely on other security mechanisms such as strong authentication requirements, behavior analytics that don't depend on device identifiers, and encrypted session tokens We recognize this creates some security trade-offs, but we've implemented compensating controls to address the risks If we need to investigate specific security incidents, we may temporarily enable IP logging with appropriate approvals and notifications to users.
Context
- Tab
- Privacy
- Category
- Privacy of Sensitive Data

