tencent cloud

Feedback

Data Processing And Security Agreement

Last updated: 2024-07-01 11:43:38

    1. BACKGROUND

    This Module applies if you use the Anti-DDoS Service (“Feature”). This Module is incorporated into the Data Processing and Security Agreement located at (“DPSA”). Terms used but not defined in this Module shall have the meaning given to them in the DPSA. In the event of any conflict between the DPSA and this Module, this Module shall apply to the extent of the inconsistency.

    2. PROCESSING

    We will process the following data in connection with the feature:
    Edition
    Personal Information
    Use
    Anti-DDoS Advanced
    Forwarding Configuration Data: Forwarding configuration information (access service domain name, return source target source, access protocol/port, return source target source). Alarm Data: Alarm configuration data. Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
    We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
    Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
    Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
    We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.
    Anti-DDoS Pro
    Binding Data: Binding relation data in respect of the configuration
    We only process this data for the purposes of providing the Feature to you to assist you in determining the effective scope of your security policies.
    Alarm Data: Alarm configuration data.
    Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
    We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
    Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
    Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
    We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.

    3. SERVICE REGION

    As specified in the DPSA.

    4. SUB-PROCESSORS

    As specified in the DPSA.

    5. DATA RETENTION

    We will store personal data processed in connection with the Feature as follows (unless otherwise required by applicable Data Protection Laws):
    Edition
    Personal Information
    Retention Policy
    Anti-DDoS Advanced
    Forwarding Configuration Data
    Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Alarm Data
    Strategy Configuration Data
    Business Analysis Data
    We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Attack Analysis Data
    Stored for a maximum of 1 year.
    Anti-DDoS Pro
    Binding Data
    Alarm Data
    Strategy Configuration Data
    Business Analysis Data
    Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Attack Analysis Data
    Stored for a maximum of 1 year.

    6. SPECIAL CONDITIONS

    You acknowledge, understand and agree that (i) we do not make any representation or warranty or give any undertaking that this Feature will be in compliance with any applicable laws or regulations, (ii) you have obtained any necessary licenses, registrations or approvals that may be required in connection with or related to the use of the Feature and (iii) any reliance on or use of this Feature is at your sole risk.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support