This Module applies if you use T-Sec Data Security Center (“Feature”). This Module is incorporated into the Data Privacy and Security Agreement located at DPSA. Terms used but not defined in this Module shall have the meaning given to them in the DPSA. In the event of any conflict between the DPSA and this Module, this Module shall apply to the extent of the inconsistency.
We will process the following data in connection with the Feature:
|Configuration Data: customer's APPID, UIN, asset identification authority switch, task scan time, task scan frequency, number of task samples, number of task sample data saved.||We only process this data for the purposes of providing the Feature to you in accordance to your specific configuration.|
1. Customer operation log:Back-end logic operation time, unique identification of interface call, back-end code positioning, operation content (interaction with product business database; key business node mark: interface time-consuming statistics; billing purchase, specification, duration and renewal information).
2. Regular scheduling log:Background logic operation time, background code positioning, operation content (interaction with product business DB; business key node mark: system initialization start and end time, task start and end time, scan task corresponding to the total number of corresponding tables in the scan task DB), SQL information, SQL parameters, internal key node prompt information (user task start time, task completion time, total number of corresponding tables), customer APPID, UIN
|We use this data for the purposes of providing the Feature to you and facilitate the services, as well as enable as to undertake any troubleshooting.|
|Usage data: The total number of data assets purchased by a customer and the number of authorized assets.||We process this data to allow us to monitor the data assets that have been used.|
As specified in the DPSA.
As specified in the DPSA.
We will store personal data processed in connection with the Feature as follows:
|Personal Information||Retention Policy|
|Configuration Data||We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.|
|Log Data||Log data will be automatically deleted after 60 days of first being recorded.|
|Usage Data||We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.|
You can request deletion of such personal data in accordance with the DPSA.
You must ensure that this Feature is only used by end users who are of at least the minimum age at which an individual can consent to the processing of their personal data. This may be different depending on the jurisdiction in which an end user is located.