tencent cloud

文档反馈

Data Processing And Security Agreement

最后更新时间:2024-07-01 11:43:38

    1. BACKGROUND

    This Module applies if you use the Anti-DDoS Service (“Feature”). This Module is incorporated into the Data Processing and Security Agreement located at (“DPSA”). Terms used but not defined in this Module shall have the meaning given to them in the DPSA. In the event of any conflict between the DPSA and this Module, this Module shall apply to the extent of the inconsistency.

    2. PROCESSING

    We will process the following data in connection with the feature:
    Edition
    Personal Information
    Use
    Anti-DDoS Advanced
    Forwarding Configuration Data: Forwarding configuration information (access service domain name, return source target source, access protocol/port, return source target source). Alarm Data: Alarm configuration data. Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
    We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
    Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
    Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
    We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.
    Anti-DDoS Pro
    Binding Data: Binding relation data in respect of the configuration
    We only process this data for the purposes of providing the Feature to you to assist you in determining the effective scope of your security policies.
    Alarm Data: Alarm configuration data.
    Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection).
    We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration.
    Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download.
    Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access.
    We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events.

    3. SERVICE REGION

    As specified in the DPSA.

    4. SUB-PROCESSORS

    As specified in the DPSA.

    5. DATA RETENTION

    We will store personal data processed in connection with the Feature as follows (unless otherwise required by applicable Data Protection Laws):
    Edition
    Personal Information
    Retention Policy
    Anti-DDoS Advanced
    Forwarding Configuration Data
    Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Alarm Data
    Strategy Configuration Data
    Business Analysis Data
    We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Attack Analysis Data
    Stored for a maximum of 1 year.
    Anti-DDoS Pro
    Binding Data
    Alarm Data
    Strategy Configuration Data
    Business Analysis Data
    Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Attack Analysis Data
    Stored for a maximum of 1 year.

    6. SPECIAL CONDITIONS

    You acknowledge, understand and agree that (i) we do not make any representation or warranty or give any undertaking that this Feature will be in compliance with any applicable laws or regulations, (ii) you have obtained any necessary licenses, registrations or approvals that may be required in connection with or related to the use of the Feature and (iii) any reliance on or use of this Feature is at your sole risk.
    联系我们

    联系我们,为您的业务提供专属服务。

    技术支持

    如果你想寻求进一步的帮助,通过工单与我们进行联络。我们提供7x24的工单服务。

    7x24 电话支持