How CylanceOPTICS collects and uses data
CylanceOPTICS
collects and uses dataFor complete information about this product, see the Cylance Endpoint Security docs.
Item | Data collection and use |
---|---|
Customer administration information | BlackBerry collects the following customer administration data to deliver customer support:
|
Collecting data to detect and respond to threats |
|
Collection of endpoint configuration data | BlackBerry collects the following on the configuration of a device endpoint to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint process artifacts | BlackBerry collects the following information about endpoint process artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint file artifacts | BlackBerry collects the following information about endpoint file artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint user artifacts | BlackBerry collects the following information about endpoint user artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint registry artifacts (Windows OS only) | BlackBerry collects and processes the following information about endpoint registry artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint network artifacts | BlackBerry collects and processes the following information about endpoint network artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
Collection of endpoint event data | BlackBerry collects and processes the following information about endpoint event data to assess the impact of potentially malicious activity on customer endpoints:
|
Detections data | BlackBerry collects the following information on detection data to manage the resolution of detected events:
|
Customer administrative login activity | BlackBerry collects and processes login activity from administrators or operators of a customer's tenant (includes date and time, a user's unique identifier, status, and account name) to manage authentication auditing and risk management. |
Data storage |
|
Data retention
Personal data processed | Data retention period |
---|---|
Customer administrator information | Personal data may be deleted upon request. |
Endpoint configuration data | Data is removed 30 days after the end of the contract. |
Endpoint artifacts and event data | Data is stored in the cloud and is accessible for 30 days by default. The customer can increase the data retention timeframe by purchasing a longer storage duration. Backup data is stored for up to 15 months or 30 days after the end of contract, whichever is less. |
Alert data | Data is stored in the cloud and accessible for 37 days. Customer can increase the data retention timeframe by purchasing a longer storage duration. |
Detections data | Data is stored in the cloud and accessible for 30 days. Customer can increase the data retention timeframe by purchasing a longer storage duration. Backup data is stored for up to 15 months or 30 days after the end of contract, whichever is less. |
Focus view data | Data is stored for 30 days. |
InstaQuery results data | Data is stored in the cloud and accessible for 60 days. The customer can increase the data retention timeframe by purchasing a longer storage duration. |
Remote response transaction log | Data is stored for 30 days. |
Customer administrative login activity | Data is stored for 1 year. |