Alibaba Supplier 各種規約 (英語)

Alibaba Supplierの規約英語バージョンは下記よりご確認ください

Cloud Security Plan

Reminders

Before using the functions of Alibaba Workbench Cloud Security Plan, please carefully read and thoroughly understand the Software License Agreement of Alibaba Workbench Sellers Operation Platform, the Legal Statement and Privacy Right Policy of Taobao platform and this Alibaba Workbench Cloud Security Plan (“this Statement”). If you have any question about this Statement, you may contact us via AliTM Group 1643831239 (“Taobao Customer Service”). If you disagree with this Statement or any content herein, please stop using the functions of Alibaba Workbench Cloud Security Plan immediately. By using the functions of Alibaba Workbench Cloud Security Plan, you will be deemed as having agreed to joint in the Alibaba Workbench Cloud Security Plan and agreed with all the contents herein.

We may update this Statement from time to time and will inform you of the updated Statement through legal procedures and in the agreed way so that you may have the opportunity to read the updated contents before further use of the functions of Alibaba Workbench Cloud Security Plan.


Details of Alibaba Workbench Cloud Security Plan

    Alibaba Workbench Cloud Security Plan will, while always giving top priority to the protection of your privacy, provide you with more efficient and comprehensive network security services.

Details of Alibaba Workbench Cloud Security Plan are as follows:

(I) Automatic report of suspicious files

Alibaba Workbench Cloud Security Plan provides a function that scans local computers or terminals (“Terminal”) based on the security protection provided by Alibaba Workbench Security, reports suspicious file samples once identified and checks the security of such files by thorough cloud scanning.

You agree that we may report suspicious file samples identified to the cloud security center for analysis to protect the security of your Terminals accurately. The only suspicious file samples that we will upload are suspicious executable files for the purpose of analyzing if there are Trojans or viruses, thus providing you with safe services.

    Suspicious file samples refer to executable file samples with certain risks which are recorded neither in the Trojan and virus database of Alibaba Workbench Security nor in the white list signatures database of the program. Among the suspicious file samples, most are unknown Trojan and virus files that cause serious threat to the security of the purchase order information, transaction information and user information operated or stored by you in Alibaba Workbench Terminals. If you choose to join in the Cloud Security Plan, such suspicious file samples will be reported to the cloud security center for security check.

1. When will suspicious file samples be reported?

    1) When you install Alibaba Workbench for the first time, you will be asked whether to join in the Cloud Security Plan in the installation interface. If you click [Yes] to join in the plan, Alibaba Workbench will report suspicious file samples once they are identified. You may also choose to join in or withdraw from the Cloud Security Plan in the “settings” of Alibaba Workbench at any time.

    2) For Terminals that choose to join in the Cloud Security Plan, any suspicious file samples identified during the cloud security scanning will be automatically reported to the cloud security center.

    3) For any suspicious file sample that has been reported by any other users, the cloud security center will not require your Terminal to report the same.

2. Will the report of suspicious file samples disclose your personal information?

    Alibaba Workbench Security determines whether a file is an executable file based on its file structure. In general, an executable file does not contain personal information.

3. What operation will be made to the reported suspicious file samples?

    The reported suspicious file samples will only be used for Trojan or virus analysis. The cloud security center will analyze suspicious file samples by thorough scanning or otherwise, and deal with the files based on the analysis results. If the file is confirmed as a Trojan or virus file, the cloud security center will issue the features of such new virus to the local Trojan and virus database and notify you to delete the virus file in your local Terminal; if the file is confirmed as a normal file, the cloud security center will delete the reported file.

4. How to configure the settings for the report of suspicious file samples?

    Open the main interface of Alibaba Workbench, click the “setting” button in the top right corner on the interface, click “Cloud Security Plan”, and uncheck the box to switch off the report of samples.

5. Why is an executable file (its name remains the same) under the same path reported repeatedly?

Alibaba Workbench Security identifies the uniqueness of a file by its fingerprint. Executable files with the same file fingerprint will only be reported once among all Alibaba Workbench users. If you find that an executable file (its name remains the same) is reported repeatedly, it means that the file fingerprint of such executable file has changed, i.e., the contents or functions of such executable file have changed. Under most circumstances, such executable file that can constantly change its contents is very likely to be a Trojan file, which usually evades the scanning by security software in this way.

(II) Report of information leakage incidents

For the purpose of protecting user information, we will obtain information regarding your Terminal’s processes by invoking system functions. In the case that user information is or is threatened to be exposed to the risk of leakage, we may report the suspicious incident relating to such process and take other measures. In this way, we may use user information to prevent, identify and investigate into fraud, any act endangering security, illegal activity, or any other act that violates any agreement with, policy or rule of us or of our affiliates so as to protect user information.

1. When will suspicious incidents be reported?

Suspicious incidents include, by way of example, if a certain communication process accesses a file containing a large amount of user information in an abnormal way, it may send files containing user information to a third party through such communication process, which exposes user information to the risk of leakage. When we identify suspicious incidents as described above, we will report such incidents.

You agree that we may, for the purpose of realizing such security function, invoke relevant system functions and read the contents of the file that is abnormally accessed by the process to identify if any user information or other personal information is contained therein.

2. Will the report of suspicious incidents leak your personal information?

The act of reading files is to identify suspicious incidents only, and will not be used for any other purpose or disclosed to any third party. Therefore, report of suspicious incidents will not leak your personal information

User Experience Improvement Plan

Alibaba Workbench User Experience Improvement Plan collects statistics of the use of products in order to improve the user experience. By analyzing these statistics, the product team of Alibaba Workbench can improve the quality of products and optimize the features of products. In the analysis, we only collect statistics of the contents of Alibaba Workbench products without any involvement of your personal information or data.

    If you do not wish to send these statistics to Alibaba Workbench, you can untick the box of “opt in Alibaba Workbench User Experience Improvement Plan” when you install or upgrade Alibaba Workbench products. If you intend to opt out this plan, you can untick the box of “opt in Alibaba Workbench User Experience Improvement Plan” in the dialog box of “Settings”.

The types of statistics we collect are as follows:

1) Operational statistics generated during the users' use of Alibaba Workbench products

    In order to meet new demands from the users, we will constantly add and improve the features of products. Therefore, we need to understand the use of every product and possible problems during users' operation so that we are able to correctly determine the importance of each feature of the product and items to be optimized, and provide guidance for us to adjust the R&D priority of product features.

    We only collect statistics of the use of product features and the product operation without any involvement of your personal data.

2) Error log of the program

    When there is an accidental error in the program or the program crashes, the program will automatically record the operational information at that time and generate an error log including other associated programs when the program is operating as well as the information of relevant modules which lead to the error or crash. The program needs to submit error logs generated by the program or the system to Alibaba Workbench so that we can identify the cause of error or crash and improve the quality of products.

    The error log of the program only contains the error information of the program without any involvement of users' personal data