Our Security Measures
Product Security
Sensors Data follows a secure lifecycle management approach throughout product development. We incorporate security and privacy requirements at every phase of development. By implementing various measures, we reduce product security vulnerabilities, minimizing risks and ensuring safer products.We regularly test all Sensors Data products for security and also invite professional firms to conduct crowdsourced testing and defense exercises. This helps us identify potential security vulnerabilities from different perspectives, enhancing the overall security of our products and providing value to customers.Product Security
Sensors Data follows a secure lifecycle management approach throughout product development. We incorporate security and privacy requirements at every phase of development. By implementing various measures, we reduce product security vulnerabilities, minimizing risks and ensuring safer products.We regularly test all Sensors Data products for security and also invite professional firms to conduct crowdsourced testing and defense exercises. This helps us identify potential security vulnerabilities from different perspectives, enhancing the overall security of our products and providing value to customers.Operation Security
Sensors Data has established rigorous access control processes. Through role-based access control, we manage system resources based on the principle of least privilege. All operational activities are thoroughly logged for auditing purposes.Without customer authorization, our employees have no rights to access customer data. Access is granted only with customer authorization, following customer requirements and temporary permissions for troubleshooting or issue resolution. Sensors Data closely monitors such authorized access and promptly terminates access privileges after issue resolution.Operation Security
Sensors Data has established rigorous access control processes. Through role-based access control, we manage system resources based on the principle of least privilege. All operational activities are thoroughly logged for auditing purposes.Without customer authorization, our employees have no rights to access customer data. Access is granted only with customer authorization, following customer requirements and temporary permissions for troubleshooting or issue resolution. Sensors Data closely monitors such authorized access and promptly terminates access privileges after issue resolution.Incident Response
Sensors Data has implemented a mature security incident management mechanism that immediately initiates emergency response procedures when security incidents occur. We respond to security incidents quickly and effectively, minimizing the impact of security incidents as much as possible. After incident resolution, we conduct post-incident reviews to reduce the likelihood of recurring incidents. In the event of personal information security incidents, we promptly inform customers of basic incident details, potential impacts, and measures taken.Incident Response
Sensors Data has implemented a mature security incident management mechanism that immediately initiates emergency response procedures when security incidents occur. We respond to security incidents quickly and effectively, minimizing the impact of security incidents as much as possible. After incident resolution, we conduct post-incident reviews to reduce the likelihood of recurring incidents. In the event of personal information security incidents, we promptly inform customers of basic incident details, potential impacts, and measures taken.Vulnerability Management
Sensors Data has a comprehensive vulnerability management strategy, monitoring internal and external security vulnerabilities and threat intelligence through various means. We assess and address vulnerabilities and threat information related to Sensors Data products, managing them through a process mechanism that emphasizes accountability, timely resolution, and process visibility, ensuring that all security vulnerabilities can be promptly resolved.Vulnerability Management
Sensors Data has a comprehensive vulnerability management strategy, monitoring internal and external security vulnerabilities and threat intelligence through various means. We assess and address vulnerabilities and threat information related to Sensors Data products, managing them through a process mechanism that emphasizes accountability, timely resolution, and process visibility, ensuring that all security vulnerabilities can be promptly resolved.Data Security
Data Collection
Sensors Data strictly follows the principles of legality, legitimacy, and necessity when collecting data. We inform and explain rules regarding the use of personal information through privacy policies and other means. Data collection only begins after obtaining final user authorization.Data Transmission
After data collection, Sensors Data software products support encrypted data caching. During data transmission, we employ link encryption or data encryption to secure the transmission of data.Data Storage
During the data storage phase, Sensors Data fully addresses data leakage concerns by encrypting incoming data to effectively prevent data leakage risks resulting from internal and external malicious activities.Data Sharing
Sensors Data take measures to prevent data leakage risks during data sharing and usage. Our products adhere to the principle of balancing data availability and security. We offer data desensitization display, data watermarking, and other methods to help reduce the risk of data leakage.Data Deletion and Destruction
Sensors Data products comply with regulations and offer exit mechanisms. When users or data subjects do not wish to use Sensors Data's products and services, they can deactivate data collection through Sensors Data SDK and use data cleanup functionality for data deletion. Data deletion supports batch deletion of imported event data and user data deletion based on user IDs.Data Security
Data Collection
Sensors Data strictly follows the principles of legality, legitimacy, and necessity when collecting data. We inform and explain rules regarding the use of personal information through privacy policies and other means. Data collection only begins after obtaining final user authorization.Data Transmission
After data collection, Sensors Data software products support encrypted data caching. During data transmission, we employ link encryption or data encryption to secure the transmission of data.Data Storage
During the data storage phase, Sensors Data fully addresses data leakage concerns by encrypting incoming data to effectively prevent data leakage risks resulting from internal and external malicious activities.Data Sharing
Sensors Data take measures to prevent data leakage risks during data sharing and usage. Our products adhere to the principle of balancing data availability and security. We offer data desensitization display, data watermarking, and other methods to help reduce the risk of data leakage.Data Deletion and Destruction
Sensors Data products comply with regulations and offer exit mechanisms. When users or data subjects do not wish to use Sensors Data's products and services, they can deactivate data collection through Sensors Data SDK and use data cleanup functionality for data deletion. Data deletion supports batch deletion of imported event data and user data deletion based on user IDs.