Access Management
Who can access my recordings by default?
Who can access my recordings by default?
- The meeting organizer
- Users specifically invited to the meeting (if enabled in your settings)
- Workspace administrators (if enabled in your organization’s settings)
How do I share recordings with others?
How do I share recordings with others?
What permission levels are available?
What permission levels are available?
- View only: Can watch/listen to recordings and view transcripts
- Comment: View plus ability to add comments and annotations
- Edit: Comment plus ability to edit transcripts and metadata
- Share: Edit plus ability to share with others
- Manage: Full control including deletion and permission management
- Special permissions: Custom permission sets for specific use cases
Can I revoke access after sharing?
Can I revoke access after sharing?
- Revoke access for specific users or groups at any time
- Expire shared links automatically or manually
- Track who has accessed shared content
- Receive notifications for access events
- Audit access history to maintain compliance
Sharing Features
Can I share specific segments instead of entire recordings?
Can I share specific segments instead of entire recordings?
How do I share content with external users?
How do I share content with external users?
Can I customize what shared users can see?
Can I customize what shared users can see?
Does BuildBetter integrate with SSO for permissions?
Does BuildBetter integrate with SSO for permissions?
- Role-based access synchronized with your IdP
- Group-based permissions that reflect your organization structure
- Single Sign-On (SSO) for seamless access
- Automated permission updates based on organizational changes
- Centralized access management and reporting
Organization Controls
How do workspace permissions work?
How do workspace permissions work?
- Organization-wide settings: Global policies set by administrators
- Workspace-specific settings: Policies for specific teams or departments
- Folder permissions: Access controls for groups of related recordings
- Individual recording permissions: Settings for specific content
Can administrators override sharing settings?
Can administrators override sharing settings?
- Standard setting: Admins can access all content for management purposes
- Privacy-focused setting: Admin access requires approval or is logged for audit
- Restricted setting: Certain content can be protected even from administrators
How do I implement role-based access control?
How do I implement role-based access control?
- Predefined roles: Use BuildBetter’s default role templates
- Custom roles: Create organization-specific roles with tailored permissions
- Group synchronization: Align with existing groups from your directory service
- Automated assignments: Set rules for automatic role assignment
- Inheritance controls: Define how permissions propagate through your hierarchy
Security Features
How secure are shared recordings?
How secure are shared recordings?
Can recipients download or redistribute recordings?
Can recipients download or redistribute recordings?
- Enable/disable download functionality
- Allow screenshots or prevent them
- Enable/disable sharing by recipients
- Set expiration dates for access
- Limit the number of views
- Receive notifications when content is accessed
How do I track who has accessed my shared content?
How do I track who has accessed my shared content?
Best Practices
What are recommended sharing practices?
What are recommended sharing practices?
- Least privilege principle: Share with the minimum necessary permissions
- Time-limited access: Set expiration dates when appropriate
- Regular audits: Periodically review who has access to what
- Clear labeling: Use descriptive names for shared content
- Segment sharing: Share only relevant portions when possible
- Permission templates: Create consistent permission sets for common scenarios
Should we have a sharing policy?
Should we have a sharing policy?
- Who is authorized to share recordings
- Appropriate recipients for different content types
- Required approval processes (if any)
- Permitted sharing methods
- Prohibited sharing scenarios
- Handling of sensitive information
- Content classification guidelines