tencent cloud

Feedback

Privacy Policy

Last updated: 2022-02-28 14:43:57

    1. INTRODUCTION

    This Module applies if you use Vulnerability Scan Service (“Feature”). This Module is incorporated into the privacy policy located at Privacy Policy. Terms used but not defined in this Module shall have the meaning given to them in the Privacy Policy. In the event of any conflict between the Privacy Policy and this Module, this Module shall apply to the extent of the inconsistency.

    2. CONTROLLERSHIP

    The controller of the personal information described in this Module is as specified in the Privacy Policy.

    3. AVAILABILITY

    This Feature is available to users globally but primarily intended for users located in the same country/region as the selected service region for optimal performance.

    4. HOW WE USE PERSONAL INFORMATION

    We will use the information in the following ways and in accordance with the following legal basis:
    Personal Information
    Use
    Legal Basis
    Vulnerability Scanning Engine Operating Data: engine operation time, engine operation count, engine operation status, engine task log data
    We use this information to ensure the engine functions as required, to provide this Feature to you.
    Please note that this data is stored in our TencentDB for Redis (Redis), TencentDB for MySQL (MySQL) and TencentDB for MongoDB (MongoDB) features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.
    Asset Mapping Engine Operating Data: map of engine operation
    We use this information to provide this Feature to you, including to generate security scan, risk and related reports, provide risk warnings and vulnerability detection notifications, and provide repair suggestions.
    Please note that this data is stored in our Redis, MySQL and MongoDB features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.
    User Quota Data: expiry date and time, number of domain names, number of IPs, number of APIs
    We use this information to calculate your user quota and charge, for billing purposes.
    Please note that this data is stored in our Redis, MySQL and MongoDB features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.
    Task Log Data: task name, monitoring type, scanned asset scanning plan, scanning speed, scanning duration, scanning result
    We use this information to provide this Feature to you, and for troubleshooting.
    Please note that this data is stored in our TencentDB for Redis, TencentDB for MySQL and TencentDB for MongoDB features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.
    Vulnerability Matching Data: Vulnerability name, threat level, affected assets, vulnerability type, time when last found
    We use this information to provide this Feature to you, and for troubleshooting.
    Please note that this data is stored in our TencentDB for Redis, TencentDB for MySQL and TencentDB for MongoDB features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.
    Port Matching Data: port, vulnerability response suggestions, protocol, port service
    We use this information to provide this Feature to you, and for troubleshooting.
    Please note that this data is stored in our TencentDB for Redis, TencentDB for MySQL and TencentDB for MongoDB features for this purpose.
    We process this information as it is necessary for us to perform our contract with you to provide the Feature.

    5. HOW WE SHARE AND STORE PERSONAL INFORMATION

    As specified in the Privacy Policy.

    6. DATA RETENTION

    We will retain personal information in accordance with the following:
    Personal Information
    Retention Policy
    Vulnerability Scanning Engine Operating Data
    Stored for 7 days.
    Asset Mapping Engine Operating Data
    Stored for 7 days.
    User Quota Data
    We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Task Log Data
    We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Vulnerability Matching Data
    We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    Port Matching Data
    We retain such data for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days.
    
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support