AUP(Acceptable Use Policy)

White circle illustration.

LINNALL is committed to providing secure and reliable e-commerce management solutions for Amazon sellers. We strictly adhere to the Amazon Developer Agreement, Data Protection Policy, and Acceptable Use Policy (AUP), and take the following technical and management measures to ensure the security of your Amazon seller data.

1、 Serious commitment to data security and privacy protection

1.1 Data Encryption and Storage

  • Transmission encryption: All data transmission with the Amazon platform is conducted through HTTPS protocol and TLS 1.2 encryption is used to ensure that the data is not eavesdropped or tampered with during transmission.
  • Storage encryption: All Amazon seller data is encrypted using AES-256 and stored in a separate encrypted database. We use databases such as MySQL that have undergone security audits and perform regular backups and security scans on them.
  • Data isolation: The data of different customers is strictly isolated to prevent data leakage.

1.2 Access Control

  • Role division and minimum authority principle: We divide employees into different roles and assign minimum permissions based on their roles to ensure that employees can only access necessary data for their work.
  • Permission Audit: Regularly audit employees' access permissions to ensure the reasonableness of permission settings.
  • 1.3 Data Lifecycle Management
  • Data minimization: We only collect, store, and process the minimum amount of data necessary for providing services.
  • Data retention policy: We have established clear data retention policies in accordance with Amazon AUP and relevant laws and regulations. Generally, we retain data for a specific number of days, and data that exceeds the retention period will be anonymized or securely deleted.
  • Data destruction: When data is destroyed, we will use secure and reliable methods such as data erasure, physical destruction, etc.

1.4 Network Security Protection

  • Firewall: We have deployed a next-generation firewall that strictly filters inbound and outbound traffic to prevent unauthorized access.
  • Intrusion Detection System (IDS): We have deployed IDS to monitor network traffic in real-time, detect and prevent potential attacks in a timely manner.
  • Intrusion Prevention System (IPS): We have deployed IPS to proactively defend against network attacks.
  • Vulnerability scanning: We regularly conduct vulnerability scans on the system and promptly fix security vulnerabilities.
  • Web Application Firewall (WAF): We have deployed WAF to protect web applications from common web attacks.

1.5 Emergency Response

  • We have developed a detailed emergency response plan for data breaches and will take timely measures to control losses and notify relevant regulatory authorities and affected users in the event of a data breach.

1.6 Employee Training

  • We regularly provide data security training to our employees to enhance their awareness of data security.

1.7 Compliance

  • We strictly adhere to the Amazon Developer Agreement, data protection policies, and AUP regulations, and comply with relevant laws and regulations such as the Personal Information Protection Law of the People's Republic of China, the General Data Protection Regulation (GDPR), and the California Consumer Privacy Act (CCPA).

1.8 Why choose us?

  • Amazon AUP certification: We are officially certified partners of Amazon and have a deep understanding of Amazon's rules and regulations.
  • Multiple security authentication: We are improving multiple security certifications, such as ISO 27001, SOC 2, and other security systems, and we are committed to long-term investment in information security.
  • Professional security team: We have a professional security team responsible for monitoring system security and responding to security threats in a timely manner.
  • Comprehensive security system: We have established a comprehensive data security system, covering various aspects such as data collection, storage, processing, and transmission, to promptly respond to security threats.

2、 By using our ERP system, you can enjoy the following advantages with peace of mind:

  • Automated management of Amazon orders
  • Real time inventory synchronization
  • Product Information Management
  • Data analysis and reporting

3、 Technical Details Explanation

  • Encryption algorithm: AES-256 is currently one of the most secure encryption algorithms.
  • Database: MySQL is an open-source database that has undergone security auditing.
  • Backup method: We adopt a combination of incremental backup and full backup, and conduct regular testing.
  • Network security devices: We have deployed multiple protection measures such as next-generation firewalls, IDS, IPS, and WAF.

4、 Warm reminder

We deeply understand the importance of data security to your business. By adopting a series of strict security measures and certifications, we are committed to providing you with a secure and reliable e-commerce management platform.

  • Authorization scope: We can only access your Amazon seller account data with your explicit authorization.
  • Data security responsibility: You have an obligation to properly safeguard your Amazon seller account login information to avoid leakage.

Through the above measures, we are committed to providing you with a safe and reliable e-commerce management platform.

5、 Technical Details Explanation

  • Encryption algorithm: AES-256 is currently one of the most secure encryption algorithms, widely used in fields such as finance and government that require extremely high data security.
  • Database: MySQL is a commonly used open-source database with excellent performance and security.
  • Backup method: Incremental backup can reduce the amount of backup data and improve backup efficiency; Full backup can ensure the integrity of data.
  • Firewall: The next generation of firewalls can provide more advanced threat protection capabilities.
  • Intrusion detection system: By monitoring network traffic in real-time, attacks can be detected and responded to in a timely manner.
  • Vulnerability scanning: Regular vulnerability scanning can promptly detect and fix security vulnerabilities in the system.
  • OWeb Application Firewall: WAF can effectively resist common web attacks such as SQL injection, cross site scripting attacks, etc.

LINNALL will continue to monitor the latest policies of Amazon Developer API and continuously optimize our services to provide customers with safer, more reliable, and efficient e-commerce management solutions.

If you have any questions about our data security policy, please feel free to contact us at any time.

Phone: 18948190022 (same WeChat number)

Email: maxj@wlwytech.com

https://www.linnall.com/

2024/08/04

Contact us now

Discover how Linnall can help you develop your e-commerce business.

Linnall will help you link all your sales channels and stores, manage the entire supply chain, complete every fulfillment, and grasp every profit opportunity.

Sign up for FREE
Irregular form with circles.