Data Category | Details |
Configuration Data | Configuration and settings including access service domain name, return and target source, rules and parameters, vulnerability classification, network and system attributes, service and security settings for the Features. |
Diagnostic and Usage Data | Information of the software or hardware related to performance, users' activities, network connections, business traffic, attack statistics, tasks, scan, server, container, cluster, access and operations logs, any problem you experience, error reports, your settings, connectivity and updates. |
Threat Intelligence Information | Data about potential and confirmed cyber security threats and security vulnerabilities such as security vulnerability description, attackers’ techniques, patterns, behaviors, and information used to carry out the attack (for example, phishing emails, malicious or target IP addresses, and compromised credentials or government-issued identifiers), data generated from the use of penetration testing tools, vulnerability match results, port match data. |
Authentication and Security Credential Information | Information for user and role management including permission settings, database IP addresses, account number, users identifiers, database password. |
User Contact | Information such as contact name, email address provided to us to contact you regarding your use of the Features including to sending you the penetration test report. |
User Equipment Information | Data about device and system of the Feature users such as device model, operating system, device identified (e.g. UDID, Android ID). |
Purpose | Legal Basis |
Provide our Features. We use data including Configuration Data, Diagnostic and Usage Data, Threat Intelligence Information, Authentication and Security Credential Information, User Contact and User Equipment Information to operate and provide you with the Features. | It is necessary for us to process this information in order to perform our contract with you, or to take steps at your request prior to entering a contract with you. |
Maintain your configuration settings. We use data including Configuration Data to maintain your configuration settings of the Features and deliver statistics to help you manage the Features. | It is necessary for us to process this information in order to perform our contract with you, or to take steps at your request prior to entering a contract with you. |
Troubleshooting. We use data including Configuration Data, Diagnostic and Usage Data, Threat Intelligence Information, Authentication and Security Credential Information, User Contact and User Equipment Information to monitor the Feature performance and quality, detect and identify errors, bugs or failures, analyze the reasons and troubleshoot such problems. | It is necessary for us to process this information in order to perform our contract with you, or to take steps at your request prior to entering a contract with you. |
Billing. We use data including Diagnostic and Usage Data to facilitate our billing process. | It is necessary for us to process this information in order to perform our contract with you, or to take steps at your request prior to entering a contract with you. |
Improve, optimise and develop our Features. We use data including Configuration Data, Diagnostic and Usage Data, Threat Intelligence Information, Authentication and Security Credential Information, User Contact, and User Equipment Information to analyse and understand our potential customers, and improve and optimise our Features. | It is in our legitimate interests to process this information to understand our potential customers and visiting trend of our Features’ websites, and to improve the Features. |
Feedback