Configure Usage Data Dialog Box
How do I get to this dialog box?
-
Open the Workspace Settings dialog box.
The steps depend on your user interface mode.
User Interface Mode Steps Ribbon On the File menu or the Reflection button (if using the Office 2007 Look and Feel), choose Reflection Workspace Settings. Reflection Browser On the Reflection menu, choose Settings and then Reflection Workspace Settings. TouchUx Tap the Gear icon and then select Reflection Workspace Settings. -
Under Workspace Settings, select Configure Usage Data.
The Product Experience Improvement program is designed to help Open Text improve Reflection over time. This program collects information about how people use Reflection without interrupting the users in their tasks. The information that is collected helps Open Text identify which Reflection features to improve.
Reflection is set to participate in this program by default. If you choose not to participate, you'll need to clear the Enable Usage Data option and then close and reopen the workspace.
note
This setting is saved in the Application.Settings
file. If you are deploying this setting, you will need to create a package for this custom file as shown in "Configure And Automatically Package Workspace Settings" in the Reflection Deployment Guide.
Types of information that are collected when Enable Usage Data is selected
When the Enable Usage Data option is selected, Reflection sends telemetry data for product errors, settings, and use of features to Open Text, such as:
-
Application errors
-
Application settings such as the types of terminals used, types of secure connection settings, and whether keyboard maps or other default configuration files are customized
-
Whether features such as Auto Complete or File Transfer are used
-
Which types of automation (for example, VBA) are used or edited
-
The duration of workspace and terminal sessions
Types of information that are not collected
Reflection does not collect personal information, information about networks, or application data such as:
-
Personally identifiable information or information that identifies your organization and users
-
Scripts, passwords, and data files
-
Host names, IP addresses, and other information about your network
-
Data directories such as trusted locations, user data directories, and application data directories
-
Application data, or any other information about your applications