tencent cloud

All product documents
Anti-DDoS
Documentation Anti-DDoSProduct PolicyData Processing And Security Agreement
Data Processing And Security Agreement
Last updated: 2024-07-01 11:43:38
Data Processing And Security Agreement
Last updated: 2024-07-01 11:43:38

1. BACKGROUND

This Module applies if you use the Anti-DDoS Service (“Feature”). This Module is incorporated into the Data Processing and Security Agreement located at (“DPSA”). Terms used but not defined in this Module shall have the meaning given to them in the DPSA. In the event of any conflict between the DPSA and this Module, this Module shall apply to the extent of the inconsistency.

2. PROCESSING

We will process the following data in connection with the feature:
Edition
Personal Information
Use
Anti-DDoS Advanced
Forwarding Configuration Data: Forwarding configuration information (access service domain name, return source target source, access protocol/port, return source target source). Alarm Data: Alarm configuration data. Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.
Anti-DDoS Pro
Binding Data: Binding relation data in respect of the configuration
We only process this data for the purposes of providing the Feature to you to assist you in determining the effective scope of your security policies.
Alarm Data: Alarm configuration data.
Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.

3. SERVICE REGION

As specified in the DPSA.

4. SUB-PROCESSORS

As specified in the DPSA.

5. DATA RETENTION

We will store personal data processed in connection with the Feature as follows (unless otherwise required by applicable Data Protection Laws):
Edition
Personal Information
Retention Policy
Anti-DDoS Advanced
Forwarding Configuration Data
Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
Alarm Data
Strategy Configuration Data
Business Analysis Data
We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
Attack Analysis Data
Stored for a maximum of 1 year.
Anti-DDoS Pro
Binding Data
Alarm Data
Strategy Configuration Data
Business Analysis Data
Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
Attack Analysis Data
Stored for a maximum of 1 year.

6. SPECIAL CONDITIONS

You acknowledge, understand and agree that (i) we do not make any representation or warranty or give any undertaking that this Feature will be in compliance with any applicable laws or regulations, (ii) you have obtained any necessary licenses, registrations or approvals that may be required in connection with or related to the use of the Feature and (iii) any reliance on or use of this Feature is at your sole risk.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 available.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon