Open the Reflection Workspace Settings dialog box.
The steps depend on your user interface mode.
User Interface Mode |
Steps |
---|---|
Ribbon |
On the File menu or the Reflection button (if using the Office 2007 Look and Feel), choose Reflection Workspace Settings. |
Reflection Browser |
On the Reflection menu, choose Settings and then Reflection Workspace Settings. |
TouchUx |
Tap the Gear icon and then select Reflection Workspace Settings. |
Click Configure Usage Data.
The Product Experience Improvement program is designed to help Micro Focus improve Reflection over time. This program collects information about how people use Reflection without interrupting the users in their tasks. The information that is collected helps Micro Focus identify which Reflection features to improve.
Reflection is set to participate in this program by default. If you choose not to participate, you’ll need to clear the Enable Usage Data option and then close and reopen the workspace.
NOTE:This setting is saved in the Application.Settings file. If you are deploying this setting, you will need to create a package for this custom file as shown in “Configure And Automatically Package Workspace Settings” in the Reflection Deployment Guide.
Types of information that are collected when Enable Usage Data is selected
When the Enable Usage Data option is selected, Reflection sends telemetry data for product errors, settings, and use of features to Micro Focus, such as:
Application errors
Application settings such as the types of terminals used, types of secure connection settings, and whether keyboard maps or other default configuration files are customized
Whether features such as Auto Complete or File Transfer are used
Which types of automation (for example, VBA) are used or edited
The duration of workspace and terminal sessions
Types of information that are not collected
Reflection does not collect personal information, information about networks, or application data such as:
Personally identifiable information or information that identifies your organization and users
Scripts, passwords, and data files
Host names, IP addresses, and other information about your network
Data directories such as trusted locations, user data directories, and application data directories
Application data, or any other information about your applications