Help Center/ Data Security Center/ Service Overview/ Security/ Data Protection Technologies
Updated on 2022-11-11 GMT+08:00

Data Protection Technologies

DSC takes different measures to keep data secure and reliable.

Table 1 DSC data protection methods and features

Method

Description

Reference

Transmission encryption (HTTPS)

DSC supports HTTP and HTTPS, but HTTPS is recommended to enhance the security of data transmission.

Making an API Request

Personal data protection

DSC controls access to the data and records logs for operations performed on the data.

Personal Data Protection

Privacy protection

  • DSC encrypts sensitive data such as database account information of users before storing it, supports encryption key rotation.
  • During user data detection, data is not spilled to disks and is processed only in the memory. After the processing, the original data is deleted in a timely manner.

-

Data backup

The DSC supports user data backup.

-

Data destruction

If a user deletes service data or is deregistered, the DSC will physically delete all the service data and user data.

-

Data masking

DSC can mask sensitive data without affecting the original user data. The masking methods include static masking and dynamic masking.

Configuring a Data Masking Rule

Data watermarking

DSC can watermark user data in PDF, PPT, Word, and Excel formats, ensuring users' ownership on their data assets.

Watermark Injection