Edition | Personal Information | Use | Legal Basis |
Anti-DDoS Advanced | Forwarding Configuration Data: Forwarding configuration information (access service domain name, return source target source, access protocol/port, return source target source) | We use this information to ensure that the Feature operates in accordance with your instructions and for billing calculation in respect of your use of the Feature. Please note that this data is stored and backed up in MySQL (“MySQL”) in Singapore. | We process this information as it’s necessary for us to perform our contract with you to provide the Feature. |
| Traffic Statistics: Operation logs, traffic statistics, attacked data logging. | We maintain a log of traffic information to analyse attack postures, security events and deliver user statistic reports for the Feature. Please note that this data is partially stored and backed up in Clickhouse and MySQL in Singapore. | |
| Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download. Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access. | We use this information to ensure that the Feature operates in accordance with your instructions and for billing calculation in respect of your use of the Feature. Please note that this data is stored and backed up in MySQL in Singapore. | |
| Operations Log Data: APPID, UIN, operation time, request ID, product type, operation content, operation result, operator account, operation parameters. | We use this information for troubleshooting, operation and maintenance analysis. Please note that this data is stored and backed up in MySQL in Singapore. | |
Anti-DDoS Pro | Binding Data: Binding relation data in respect of the configuration | We use this information to ensure that the Feature operates in accordance with your instructions and for billing calculation in respect of your use of the Feature. Please note that this data is stored and backed up in MySQL in Singapore. | We process this information as it’s necessary for us to perform our contract with you to provide the Feature. |
| Traffic Statistics: Operation logs, traffic statistics, attacked data logging. | We maintain a log of traffic information to determine attack postures and deliver user statistic reports for the Feature. | |
| Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download. Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access. | We use this information to ensure that the Feature operates in accordance with your instructions and for billing calculation in respect of your use of the Feature. Please note that this data is stored and backed up in MySQL in Singapore. | |
| Operations Log Data: APPID, UIN, operation time, request ID, product type, operation content, operation result, operator account, operation parameters. | We use this information for troubleshooting, operation and maintenance analysis. Please note that this data is stored and backed up in MySQL in Singapore. | |
Edition | Personal Information | Retention Policy |
Anti-DDoS Advanced | Forwarding Configuration Data | Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Traffic Statistics Business Analysis Data Operations Log Data | We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Attack Analysis Data | Stored for a maximum of 1 year. |
Anti-DDoS Pro | Binding Data | Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Traffic Statistics Business Analysis Data Operations Log Data | We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Attack Analysis Data | Stored for a maximum of 1 year. |
本页内容是否解决了您的问题?