Data Protection
When managing service data risks in your enterprise, you may classify data and protect data of the corresponding level based on the working environment and service scenario. The protection measures include but are not limited to encryption, backup, and integrity verification.
Based on the opinions of enterprises in a wide range of industries and domains and data security governance methods, Huawei Cloud Meeting provides customers with flexible functions of data security management and control.
For details about Huawei Cloud data security governance, see Huawei Cloud Data Security White Paper.
Phase |
Measure |
Brief Description |
Details |
---|---|---|---|
Collection |
Controllable data collection scope |
|
|
Transmission |
Channel encryption for transmission |
TLS 1.2 encrypted transmission channel |
Protocols such as HTTPS, SIP over TLS, and WSS support TLS 1.2 access. |
Data encryption for transmission |
Encrypted data transmission using the AES algorithm |
SRTP and AES for sharing data streams |
|
Storage |
Encrypted data storage |
Key data on the cloud can be encrypted for storage. |
|
Controllable data storage |
Meeting recordings can be stored locally. |
||
Data backup and restoration |
Enterprise configuration data can be backed up and restored in case of exceptions. |
Huawei Cloud Meeting is deployed in a multi-region, multi-AZ, and multi-active architecture. Incremental backup and full backup of enterprise configuration data ensure service availability in extreme cases. |
|
Processing |
Data masking |
Collected error data is automatically anonymized. Optional data is also anonymized and then uploaded. |
You can manually report logs or allow the Huawei Cloud Meeting app to automatically upload logs when it breaks down or experience issues occur. Only app running data is collected. Data such as MAC addresses can be anonymized. |
Sharing watermark |
Watermarks can be added on shared screens in meetings to enhance security and trace data leakage source. |
||
Exchange |
Controllable user experience program |
End user experience improvement program is supported. When the program is enabled, users can enjoy higher service efficiency. |
|
Destruction |
Controllable data destruction |
Enterprises can delete their configuration data. |
|
Regular data deletion |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot