Collected User Data
The Kiosk Client collects personal user information. Pressing I Agree in the GDPR page represents the agreement by the guest for Kiosk Client to process personal data.
- From scanned identity documents: first name, last name, document number, document expiry date, person photo
- Purpose: The Kiosk Client application collects this data for identity confirmation by comparing with a person's photo taken by the Kiosk Client camera and hotel reservation records.
- Retention duration:
- Depending on the external integrations and enabled features, face data may be stored at most 1 day or not at all. (Example: External validation enabled, and Early Arrival feature enabled will store at most 1 day.)
- Integrated PMS - Some property management systems need to be updated with the guest data scanned from the document such as street address and guest name. Retention of data sent to the PMS will follow the PMS retention settings.
- Scanned data is logged in log files. Retention follows the log file management.
- From camera: person photo
- Purpose: The Kiosk Client application collects this data for identity confirmation by comparing with scanned identity documents.
- Retention duration: Photo data is used with scanned image and follows the same retention as scanned image data.
- From credit card reader: credit card number
- Purpose: Informative. The Kiosk only receives the credit card type and the last 4 digits of the CC#.
- Retention duration: The partial CC# is stored in the database no longer than 1 day, however the partial CC# is logged in log files.
- Health declaration data
- Purpose: Collect one (for the main guest) or many (one for each additional sharers) health declaration page(s), containing the answer(s) for health questions, along with some other reservation specific info (reservation number, room number, guest full name, ...)
- Retention: The health declaration document is retained as part of the Kiosk Admin reporting data.
- Signature data
- Purpose: Collect the image of the signature which is the user's agreement with the application's terms and conditions.
- Retention: The signature can be configured to be added to a registration card in PDF format that shows the agreement to the terms on the registration card. The signature image and the registration card are retained as part of the Kiosk Admin reporting data.
- External Validation
- Purpose: Collect specific information to be sent to a local government tourism agency. Collected data includes scanned data, camera image, reservation data and possibly additional guest declaration information regarding the guest's purpose of stay.
- Retention: Data collected for external validation is retained in the Kiosk system for at most 1 day.
Note
Some of the information enumerated above (first name, last name and identity document information) is usually stored in other systems such as the PMS.
Summary of Guest Data Usage
- Which apps or services are using guest data
- What guest data is used
- Where and how is the guest data used
- Preventive actions needed to prevent disclosure of guest data
Note
Notably, PII exposure can be mitigated by turning on LUKS disk encryption. This is a documented recommendation for Ubuntu servers (UIP and Adapter Hub).
App/service exposing PII | Machine | Exposed PII | Where is the PII exposed | Preventive actions to prevent PII disclosure |
---|---|---|---|---|
Kiosk Client app | Kiosk Client | PII may be exposed in scandata folder:
|
Scan Data folder |
|
Kiosk Server | Adapter Hub |
|
Log files |
|
Kiosk Admin | Adapter Hub |
|
Reports
|
|
Mongo DB | Adapter Hub |
|
Mongo DB used by Kiosk Services |
|
PMS adapters:
|
|
|
Adapter log files |
|
Face match adapters:
|
|
Partial (first 128 bytes) base-64 images of the scanned document image and the guest photo taken at the Kiosk. | Adapter log files |
|
MIWA Adapter |
|
If debug logging is enabled:
|
Adapter log files |
|
Email Sender adapter |
|
|
Adapter log files |
|
EVA adapter |
|
|
Adapter log files |
|
UIP | UIP | UIP captures and records all values sent to and from adapters used by Smart Check-In. The same PII listed by the adapters used by a site applies to UIP. |
|
|
Details
This section describes how an application or service is using and storing guest data.
Kiosk Client Machine
Kiosk Client runs on a Windows machine.
Application | Log files | Other places that may expose PII |
---|---|---|
Kiosk Client app | Location:
|
If save scanned data feature is enabled:
|
NEC Asure ID wrapper service | Location:
|
None |
Adapter helper services (Serial2Tcp / TcpProxy) | Location:
|
None |
Assure ID scanner platform | No logs | None |
Kiosk Services on Adapter Hub Server
Kiosk Services include Kiosk Server, Kiosk Admin and Mongo DB. All are running as Docker Services on the Adapter Hub machine.
Docker service log files for Kiosk Admin, Server and Mongo:
- Can be viewed via the docker service logs
command from Ubuntu OS shell - Physical location is in a subfolder of /var/lib/docker/containers
- Actual subfolder name depends on container ID which is different across different instances)
- Log file path can be discovered with the help of docker container inspect command (knowing the container ID)
Application | Docker container log files | Docker volumes | Other places that may expose PII |
---|---|---|---|
Kiosk Server | Service name:
|
None identified | None identified |
Kiosk Admin | Service name:
|
None identified | Kiosk Admin reports PII:
|
Mongo DB | Service name:
|
Mongo DB data volume:
|
None identified |
Note
PII exposure can be mitigated by turning on LUKS disk encryption. This is a documented recommendation for Ubuntu servers (UIP and Adapter Hub).
Workflow Adapters
There are three possibilities to run a workflow adapter:
- Internal: as a Docker Service on the UIP machine it runs its log files can be found on the UIP machine (Ubuntu), as explained in above table
- External: as a Docker Service on the Adapter Hub machine
For both Internal and External adapters, the log files:
- Can be viewed via the docker service logs
command from Ubuntu OS shell - Physical location is in a subfolder of /var/lib/docker/containers
- Actual subfolder name depends on container ID which is different across different instances)
- Log file path can be learn with the help of docker container inspect command (knowing the container ID)
The Docker service names are not fixed like for Kiosk services but can be learned quickly by running the docker service ls command and looking at the image names.
WF Adapter | Docker container log files | Other places that may expose PII |
---|---|---|
Opera PMS Infor HMS |
PII:
|
None |
Neoface Watch SFA |
PII:
|
None identified |
Assa Abloy | PII: None | None identified |
MIWA | PII: If debug logging is enabled:
|
None identified |
Email Sender | PII:
|
None identified |
Microsoft Teams | PII:
|
None identified |
QR Code | PII: None | None identified |
EVA (STB) | PII:
|
None identified |
CRT-571 | PII: None | None identified |
CRT | PII: None | None identified |
Sankyo | PII: None | None identified |
UIP
UIP captures and records all values sent to and from adapters used by Smart Check-In. The same PII listed by the adapters used by Smart Check-In applies to UIP.
UIP > Workflow History
Workflow History retains all data passed to / returned by triggers, workflows and adapters. If PII information is part of this data, then it is visible in Workflow History.
We need to assume that virtually any PII data exchanged by Kiosk with various adapters via UIP may be visible in WF History at any moment. This requires login access to the UIP Administrator application.
Tip
Use the Purge History Data button at the bottom of the Workflow History page to permanently delete all the existing workflow history data.
UIP > Administration > Logging Events
If an Adapter or Kiosk Service logs PII information, then this info is visible in UIP under Administration > Logging events for that particular Kiosk Service or adapter.
PII data is only logged if Debug (All) is turned on for the adapter.
UIP > Administration > Logging Packages
If an Adapter or Kiosk Service logs PII information, then this info can be exported in a log package via Administration > Logging Packages.
Tip
Logging packages can be deleted from UIP after they are created from the Logging Packages page.