Personal Information | Use | Legal Basis |
Vulnerability Data: Data fields generated from use of tools for the penetration test (such as Kali Linux, burp suite, OWASP zap proxy, Nessus tools) based on the IP and domain name provided by you, including data relating to web security vulnerabilities, business logic security vulnerabilities, middleware security vulnerabilities, server security vulnerabilities, client program security vulnerabilities | We use this information to provide this Feature to you, including to identify network and system security defects and generate the penetration test report in accordance with your request. | We process this information as it is necessary for us to perform our contract with you to provide the Feature. |
Customer Contact Data: Your name, contact name, email address | We use this information to provide this Feature to you and to contact you regarding your use of the Feature (including to provide you with the penetration test report). | We process this information as it is necessary for us to perform our contract with you to provide the Feature. |
Personal Information | Retention Policy |
Vulnerability Data | We retain such data until we have provided the final penetration test report to you, and you have confirmed your use of the Feature (for the relevant IP and domain provided by you) has completed. |
Customer Contact Data | We retain such data until we have provided the final penetration test report to you, and you have confirmed your use of the Feature (for the relevant IP and domain provided by you) has completed. |
Was this page helpful?