CINXE.COM
How We Protect Your Service Data (Enterprise Services) – Zendesk help
<!DOCTYPE html> <html dir="ltr" lang="en-US"> <head> <meta charset="utf-8" /> <!-- v25448 --> <title>How We Protect Your Service Data (Enterprise Services) – Zendesk help</title> <meta name="description" content="The Zendesk Group is committed to providing a robust and comprehensive security program for Enterprise Services, including the security..." /><meta property="og:image" content="/hc/theming_assets/01HYDGNXBBRM9S576V92TTD3KV" /> <meta property="og:type" content="website" /> <meta property="og:site_name" content="Zendesk help" /> <meta property="og:title" content="How We Protect Your Service Data (Enterprise Services)" /> <meta property="og:description" content="The Zendesk Group is committed to providing a robust and comprehensive security program for Enterprise Services, including the security measures set forth in these Supplemental Terms (“Enterprise S..." /> <meta property="og:url" content="https://support.zendesk.com/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services" /> <link rel="canonical" href="https://support.zendesk.com/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services"> <link rel="alternate" hreflang="de" href="https://support.zendesk.com/hc/de/articles/4980543927322-Wie-wir-Ihre-Servicedaten-sch%C3%BCtzen-Unternehmensdienste"> <link rel="alternate" hreflang="en-us" href="https://support.zendesk.com/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services"> <link rel="alternate" hreflang="es" href="https://support.zendesk.com/hc/es/articles/4980543927322-C%C3%B3mo-protegemos-sus-datos-de-servicio-Servicios-empresariales"> <link rel="alternate" hreflang="fr" href="https://support.zendesk.com/hc/fr/articles/4980543927322-Protection-de-vos-Donn%C3%A9es-de-service-Services-Grands-comptes"> <link rel="alternate" hreflang="it" href="https://support.zendesk.com/hc/it/articles/4980543927322-Come-proteggiamo-i-dati-dei-servizi-Enterprise-Services"> <link rel="alternate" hreflang="ja" href="https://support.zendesk.com/hc/ja/articles/4980543927322-%E3%81%8A%E5%AE%A2%E6%A7%98%E3%81%AE%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9%E3%83%87%E3%83%BC%E3%82%BF%E3%81%AE%E4%BF%9D%E8%AD%B7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6-%E3%82%A8%E3%83%B3%E3%82%BF%E3%83%BC%E3%83%97%E3%83%A9%E3%82%A4%E3%82%BA%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9"> <link rel="alternate" hreflang="ko" href="https://support.zendesk.com/hc/ko/articles/4980543927322-%EC%84%9C%EB%B9%84%EC%8A%A4-%EB%8D%B0%EC%9D%B4%ED%84%B0-%EB%B3%B4%ED%98%B8-%EB%B0%A9%EB%B2%95-%EC%97%94%ED%84%B0%ED%94%84%EB%9D%BC%EC%9D%B4%EC%A6%88-%EC%84%9C%EB%B9%84%EC%8A%A4"> <link rel="alternate" hreflang="pt-br" href="https://support.zendesk.com/hc/pt-br/articles/4980543927322-Como-protegemos-seus-Dados-de-Servi%C3%A7o-Servi%C3%A7os-para-Empresas"> <link rel="alternate" hreflang="x-default" href="https://support.zendesk.com/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services"> <link rel="alternate" hreflang="zh-cn" href="https://support.zendesk.com/hc/zh-cn/articles/4980543927322-%E6%88%91%E4%BB%AC%E5%A6%82%E4%BD%95%E4%BF%9D%E6%8A%A4%E6%82%A8%E7%9A%84%E6%9C%8D%E5%8A%A1%E6%95%B0%E6%8D%AE-%E4%BC%81%E4%B8%9A%E6%9C%8D%E5%8A%A1"> <link rel="stylesheet" href="//static.zdassets.com/hc/assets/application-a42a464885a505c24ac3b0ab35047489.css" media="all" id="stylesheet" /> <link rel="stylesheet" type="text/css" href="/hc/theming_assets/10557657/360002256920/style.css?digest=8329826791578"> <link rel="icon" type="image/x-icon" href="/hc/theming_assets/01HYDGNXGC3R8PAHSCTJC3T9WX"> <!-- OneTrust Cookies Consent Notice start for support.zendesk.com --> <script type='text/javascript' src='https://cdn.cookielaw.org/consent/3823159c-d94a-456f-9c66-6d2b3e9ee0d6/OtAutoBlock.js' ></script> <script src='https://cdn.cookielaw.org/scripttemplates/otSDKStub.js' data-document-language='true' type='text/javascript' charset='UTF-8' data-domain-script='3823159c-d94a-456f-9c66-6d2b3e9ee0d6' ></script> <script type='text/javascript'> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for support.zendesk.com --> <meta name='zd-site-verification' content='h6jk6l1jwavcia75b342kp' /> <meta charset='UTF-8' /> <meta content='width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0' name='viewport' /> <meta name='google-site-verification' content='lwxitnGGtHn5C7DJNmUH7GB635HPfnp8PGJOOwvzjUA' /> <link rel="mask-icon" href="https://d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk-favicon.svg" color="#16140C"> <link rel="shortcut icon" href="https://d1eipm3vz40hy0.cloudfront.net/images/logos/favicons/favicon.ico"> <link rel="shortcut icon" href="https://d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk-favicon.svg"> <link rel="apple-touch-icon-precomposed" sizes="152x152" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk152.png"> <link rel="apple-touch-icon-precomposed" sizes="144x144" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk144.png"> <link rel="apple-touch-icon-precomposed" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk57.png"> <link rel="apple-touch-icon-precomposed" sizes="120x120" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk120.png"> <link rel="apple-touch-icon-precomposed" sizes="114x114" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk114.png"> <link rel="apple-touch-icon-precomposed" sizes="72x72" href="//d1eipm3vz40hy0.cloudfront.net/images/logos/zendesk72.png"> <!-- Content-Security-Policy --> <meta http-equiv="Content-Security-Policy" content="default-src * wss://*.zopim.com 'unsafe-inline' 'unsafe-eval'; font-src * data:; img-src * data:; media-src blob:; worker-src 'self' blob:;"> <!-- SEGMENT code (Pendo) --> <script> !function(){ var analytics = window.analytics=window.analytics || []; var deferredAnalytics = window.deferredAnalytics = window.deferredAnalytics || []; if (!analytics.initialize) { if(analytics.invoked) { window.console && console.error && console.error("Segment snippet included twice."); } else { analytics.invoked =! 0; analytics.methods = ["trackSubmit","trackClick","trackLink","trackForm","pageview","identify","reset","group","track","ready","alias","debug","page","once","off","on"]; analytics.factory = function(t) { return function(){ var e=Array.prototype.slice.call(arguments); e.unshift(t); deferredAnalytics.push(e); return analytics } }; for(var t=0; t < analytics.methods.length; t++){ var e = analytics.methods[t]; analytics[e]=analytics.factory(e) } analytics.load = function(t,tt,e){ var n=document.createElement("script"); n.type="text/javascript"; n.async=!0; n.src=("https:"===document.location.protocol?"https://":"http://")+(tt?"static.zdassets.com":"static-staging.zdassets.com")+"/customer_analytics_integration/"+t+"/cai.min.js"; var o=document.getElementsByTagName("script")[0]; o.parentNode.insertBefore(n,o); analytics._loadOptions=e }; analytics.SNIPPET_VERSION="4.1.0"; if (window.location.hostname === "support.zendesk.com") { analytics.load("help_center", true); } else { analytics.load("help_center_dev", false); } analytics.page(); analytics.identify(); analytics.group(); } } }(); </script> <!-- Google Tag Manager - Install in Head --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-WR9LRM2');</script> <!-- End Google Tag Manager - Install in Head --> <!-- Self-Service/ additional script to track users user_id --> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-MCXJWTH');</script> <!-- End Google Tag Manager --> <!-- BEGIN ROLLUP IMPORTMAP --> <script type="importmap"> { "imports": { "articlePage": "/hc/theming_assets/01JAWXTM387J3CQ1VQMDRTVH6V", "categoryPage": "/hc/theming_assets/01JAWXTMS697V579GTBS7NN71T", "communityPostListPage": "/hc/theming_assets/01JAWXTK510CEN3AR164QEMGQX", "communityPostPage": "/hc/theming_assets/01JAWXTKNMCRH3BT3B0BQEKY5H", "communityTopicListPage": "/hc/theming_assets/01JAWXTJN4NAWRAESWRPE2APVR", "communityTopicPage": "/hc/theming_assets/01JAWXTJYNM0Z24K9MSEV7W58N", "contributionsPage": "/hc/theming_assets/01JAWXTKTTPXT0DQ4PCPX4RXET", "errorPage": "/hc/theming_assets/01JAWXTM76SE6N72YG6AZFKDD1", "footer": "/hc/theming_assets/01JC17ZFXT5H1JF49X8XJ4NWM5", "header": "/hc/theming_assets/01JAWXTKDCZ4GQMC6SNZKBVDD9", "homePage": "/hc/theming_assets/01JC17ZH04HST972JB6HSQ6BVW", "newCommunityPostPage": "/hc/theming_assets/01JC17ZG0Y9FRVFN2XJWAC5ZP7", "newRequestPage": "/hc/theming_assets/01JC17ZG9CKJDSKXX8P4JF45TM", "requestPage": "/hc/theming_assets/01JC17ZFZ5ZSQEF61S03JRDPBA", "requestsPage": "/hc/theming_assets/01JAWXTMEG3GV4S2K5QYXNS6YF", "sectionPage": "/hc/theming_assets/01JC17ZG5Z8VJ8K3JXRK8620Q0", "searchResultsPage": "/hc/theming_assets/01JC17ZFZ7SMP6ZJ0056CP4A32", "subscriptionsPage": "/hc/theming_assets/01JC17ZGMJDNY2VTQBBSRYEXRN", "userProfilePage": "/hc/theming_assets/01JC17ZGTWFY1MJNN62EDH40SX", "commonsZ2": "/hc/theming_assets/01JC17ZGV2E86KH2N684MVEW2B", "wysiwygZ2": "/hc/theming_assets/01JAWXTMP123ZGDVR66NMA2BWZ", "vendorZ2": "/hc/theming_assets/01JAWXTJN9MJMZW9VZ89MAGFXN" } } </script> <!-- END ROLLUP IMPORTMAP --> </head> <body class="community-enabled"> <!-- Google Tag Manager (noscript) - Install in Body --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-WR9LRM2" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) - Install in Body --> <!-- Google Tag Manager (noscript) - Self Service user-id tracking --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-MCXJWTH" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> </div> <script> const widgetScript = document.createElement('script'); // Add widget to ignore list for one trust cookie consent. widgetScript.setAttribute("data-ot-ignore", true) const widgetOptions = { inProduct: false, jwtUrl: "", resetAuth: true, position: { bottom: "1rem", right: "1rem" } } widgetScript.onload = function () { window.__z2SunCoWidgetRef = new Z2SunCoWidget(widgetOptions); }; window.location.hostname === "support.zendesk.com" ? widgetScript.setAttribute( "src", "https://static.zdassets.com/z2-sunco-widget/z2-sunco-widget.js" ) : widgetScript.setAttribute( "src", "https://static-staging.zdassets.com/z2-sunco-widget/z2-sunco-widget.js" ); document.head.appendChild(widgetScript); </script> <div id='headerModule'></div> <script type='module'> import { renderHeader } from "header"; const profileLink = ``; const darkModeSetting = false; const localeSetting = "en-us"; const signedIn = false; const settings = { "getting_started_url": "/categories/6191839589274", "help_and_faqs_url": "/categories/6191861453978", "video_url": "https://www.youtube.com/@zendesk/playlists", "zendesk_updates_url": "/categories/4405298749210", "product_guides_url": "/categories/6191910393754", "find_tips_tutorials_url": "/categories/6191850876058", "agent_guide_url": "/categories/5021364328218", "policies_programs_url": "/categories/4405298748826", }; const container = document.getElementById("headerModule"); const props = { profileLink, darkModeSetting, localeSetting, settings, signedIn }; renderHeader(props, container); </script> <main role="main"> <div id='articlePage'></div> <div id='article-body' style="display: none;"> <p>The Zendesk Group is committed to providing a robust and comprehensive security program for Enterprise Services, including the security measures set forth in these Supplemental Terms (“Enterprise Security Measures”). During the Subscription Term, these Enterprise Security Measures may change without notice, as standards evolve or as additional controls are implemented or existing controls are modified as We deem reasonably necessary.</p> <h3>Enterprise Security Measures Utilized by Us</h3> <p>We will abide by these Enterprise Security Measures to protect Service Data as is reasonably necessary to provide the Enterprise Services:</p> <p><strong>1. Security Policies and Personnel. <span></span></strong>We have and will maintain a managed security program to identify risks and implement appropriate controls, as well as technology and processes for common attack mitigation. This program is and will be reviewed on a regular basis to provide for continued effectiveness and accuracy. We have, and will maintain, a full-time information security team responsible for monitoring and reviewing security infrastructure for Our networks, systems and services, responding to security incidents, and developing and delivering training to Our employees in compliance with Our security policies.</p> <p><strong>2. Data Transmission. <span></span></strong>We will maintain commercially reasonable administrative, physical and technical safeguards to protect the security, confidentiality, and integrity of Service Data. These safeguards include encryption of Service Data at rest and in transmission with Our user interfaces or APIs (using TLS or similar technologies) over the internet, except for any Non-Zendesk Service that does not support encryption, which You may link to through the Enterprise Services at Your election.</p> <p><strong>3. Audits and Certifications. <span></span></strong>Upon Subscriber’s request, and subject to the confidentiality obligations set forth in this Agreement, Zendesk shall make available to Subscriber that is not a competitor of Zendesk (or Subscriber’s independent, third-party auditor that is not a competitor of Zendesk) information regarding Zendesk’s compliance with the obligations set forth in this Agreement in the form of the Zendesk’s ISO 27001 certification and/or SOC 2 (under appropriate non-disclosure protections), or SOC 3 reports.</p> <p><strong>4. Incident Response. <span></span></strong>We have an incident management process for security events that may affect the confidentiality, integrity, or availability of Our systems or data that includes a response time under which Zendesk will contact its subscribers upon verification of a security incident that affects Your Service Data. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. The incident response program includes 24×7 centralized monitoring systems and on-call staffing to respond to service incidents. Unless ordered otherwise by law enforcement or government agency, You will be notified within forty-eight (48) hours of a Service Data Breach. “Service Data Breach” means an unauthorized access or improper disclosure that has been verified to have affected Your Service Data.</p> <p><strong>5. Access Control and Privilege Management. <span></span></strong>We restrict administrative access to production systems to approved personnel. We require such personnel to have unique IDs and associated cryptographic keys and/or use of complex ephemeral tokens. These keys and/or tokens are used to authenticate and identify each person’s activities on Our systems, including access to Service Data. Upon hire, Our approved personnel are assigned unique IDs and credentials. Upon termination of personnel, or where compromise of such credentials is suspected, these credentials are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know basis to match access privileges to defined responsibilities.</p> <p><strong>6. Network Management and Security. <span></span></strong>The Sub-Processors utilized by Us for hosting services maintain industry standard fully redundant and secure network architecture with reasonably sufficient bandwidth as well as redundant network infrastructure to mitigate the impact of individual component failure. Our security team utilizes industry standard utilities to provide defense against known common unauthorized network activity, monitors security advisory lists for vulnerabilities, and undertakes regular external vulnerability scans and audits.</p> <p><strong>7. Data Center Environment and Physical Security. <span></span></strong>The Sub-Processors’ environments which are utilized by Us for hosting services in connection with Our provision of the Enterprise Services employ the following security measures:</p> <ul> <li>A security organization responsible for physical security functions 24x7x365.</li> <li>Access to areas where systems or system components are installed or stored within data centers is restricted through security measures and policies consistent with industry standards.</li> <li>N+1 uninterruptible power supply and HVAC systems, backup power generator architecture and advanced fire suppression.</li> </ul> <h3>Technical and Organizational Enterprise Security Measures for Third-Party Service Providers Who Process Service Data</h3> <p>Any third-party service providers that are utilized by the Zendesk Group will only be given access to Your Account and Service Data as is reasonably necessary to provide the Enterprise Services. Zendesk maintains a vendor security review program which assesses and manages any potential risks involved in using these third-party service providers who have access to Service Data and such third-party service providers will be subject to, among the other requirements in the <a href="https://www.zendesk.com/company/agreements-and-terms/main-services-agreement/?_ga=2.55048683.1152014886.1686586533-1707380752.1673040982&_gac=1.161945038.1683846432.Cj0KCQjwpPKiBhDvARIsACn-gzCsD10kCI5b7o0424jrq8Ohg9V4FMgUisgQXnapTeN2V_838Cj_YjoaAuP3EALw_wcB" target="_blank" rel="noopener">Main Services Agreement</a>, their implementing and maintaining compliance with the following appropriate technical and organizational security measures:</p> <p><strong>1. Physical Access Controls. <span></span></strong>Third-party service providers shall take reasonable measures, such as security personnel and secured buildings, to prevent unauthorized persons from gaining physical access to data processing systems in which Service Data is Processed.</p> <p><strong>2. System Access Controls. <span></span></strong>Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.</p> <p><strong>3. Data Access Controls. <span></span></strong>Third-party service providers shall take reasonable measures to provide that Service Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have the privilege of access; and, that Service Data cannot be read, copied, modified, or removed without authorization in the course of Processing.</p> <p><strong>4. Transmission Controls. <span></span></strong>Third-party service providers shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Service Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified, or removed without authorization during electronic transmission or transport.</p> <p><strong>5. Input Controls. <span></span></strong>Third-party service providers shall take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.</p> <p><strong>6. Data Protection. <span></span></strong>Third-party service providers shall take reasonable measures to provide that Service Data is secured to protect against accidental destruction or loss.</p> <p><strong>7. Logical Separation. <span></span></strong>Third-party service providers shall logically segregate Service Data from the data of other parties on its systems to ensure that Service Data may be Processed separately.</p> <p>These terms were last updated on June 1, 2022.</p> </div> <div id="articleCommentsWrapper" style="display: none"> </div> <div id="commentFormZ2" style="display: none"> </div> <script type='module'> import { renderArticlePage } from 'articlePage'; let voteUp = ''; let voteDown = ''; voteUp = `<button type="button" class="" data-auth-action="signin" aria-label="This article was helpful" aria-pressed="false">Yes</button>`; voteDown = `<button type="button" class="" data-auth-action="signin" aria-label="This article was not helpful" aria-pressed="false">No</button>`; let author_badges = []; let contentTagItems = []; const comments = []; let commentAuthorBadges = []; const labels = []; labels.push({ "identifier": "mt" }) const signedIn = false; const darkModeSetting = false; const baseUrlSetting = "https://support.zendesk.com"; const localeSetting = "en-us"; const breadcrumbs = `<nav aria-label="Current location"> <ol class="breadcrumbs"> <li> <a href="/hc/en-us">Zendesk help</a> </li> <li> <a href="/hc/en-us/categories/4405298748826-Policies-and-programs">Policies and programs</a> </li> <li> <a href="/hc/en-us/sections/6970173601306-Zendesk-policies-and-agreements">Zendesk policies and agreements</a> </li> <li> <a href="/hc/en-us/sections/4405303723418-Zendesk-policies-and-agreements">Zendesk policies and agreements</a> </li> </ol> </nav> `; const attachments = []; const author = {"name":"Bruno Ayub Prata","url":null,"agent":true,"avatar_url":"https://secure.gravatar.com/avatar/3b4ef9a62f3fdb4c7ba52f7fafdbc741?default=https%3A%2F%2Fassets.zendesk.com%2Fhc%2Fassets%2Fdefault_avatar.png\u0026r=g","signed_in":false,"id":1901689624704,"role":"anonymous","organizations":[],"badges":[]}; const created_at = "2022-09-26T15:37:55Z"; const edited_at = "2023-06-14T00:17:58Z"; const id = 4980543927322; const title = "How We Protect Your Service Data (Enterprise Services)"; const internal = false; const body = "\u003cp\u003eThe Zendesk Group is committed to providing a robust and comprehensive security program for Enterprise Services, including the security measures set forth in these Supplemental Terms (“Enterprise Security Measures”). During the Subscription Term, these Enterprise Security Measures may change without notice, as standards evolve or as additional controls are implemented or existing controls are modified as We deem reasonably necessary.\u003c/p\u003e\n\u003ch3\u003eEnterprise Security Measures Utilized by Us\u003c/h3\u003e\n\u003cp\u003eWe will abide by these Enterprise Security Measures to protect Service Data as is reasonably necessary to provide the Enterprise Services:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e1. Security Policies and Personnel. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eWe have and will maintain a managed security program to identify risks and implement appropriate controls, as well as technology and processes for common attack mitigation. This program is and will be reviewed on a regular basis to provide for continued effectiveness and accuracy. We have, and will maintain, a full-time information security team responsible for monitoring and reviewing security infrastructure for Our networks, systems and services, responding to security incidents, and developing and delivering training to Our employees in compliance with Our security policies.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e2. Data Transmission. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eWe will maintain commercially reasonable administrative, physical and technical safeguards to protect the security, confidentiality, and integrity of Service Data. These safeguards include encryption of Service Data at rest and in transmission with Our user interfaces or APIs (using TLS or similar technologies) over the internet, except for any Non-Zendesk Service that does not support encryption, which You may link to through the Enterprise Services at Your election.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e3. Audits and Certifications. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eUpon Subscriber’s request, and subject to the confidentiality obligations set forth in this Agreement, Zendesk shall make available to Subscriber that is not a competitor of Zendesk (or Subscriber’s independent, third-party auditor that is not a competitor of Zendesk) information regarding Zendesk’s compliance with the obligations set forth in this Agreement in the form of the Zendesk’s ISO 27001 certification and/or SOC 2 (under appropriate non-disclosure protections), or SOC 3 reports.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e4. Incident Response. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eWe have an incident management process for security events that may affect the confidentiality, integrity, or availability of Our systems or data that includes a response time under which Zendesk will contact its subscribers upon verification of a security incident that affects Your Service Data. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. The incident response program includes 24×7 centralized monitoring systems and on-call staffing to respond to service incidents. Unless ordered otherwise by law enforcement or government agency, You will be notified within forty-eight (48) hours of a Service Data Breach. “Service Data Breach” means an unauthorized access or improper disclosure that has been verified to have affected Your Service Data.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e5. Access Control and Privilege Management. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eWe restrict administrative access to production systems to approved personnel. We require such personnel to have unique IDs and associated cryptographic keys and/or use of complex ephemeral tokens. These keys and/or tokens are used to authenticate and identify each person’s activities on Our systems, including access to Service Data. Upon hire, Our approved personnel are assigned unique IDs and credentials. Upon termination of personnel, or where compromise of such credentials is suspected, these credentials are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know basis to match access privileges to defined responsibilities.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e6. Network Management and Security. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThe Sub-Processors utilized by Us for hosting services maintain industry standard fully redundant and secure network architecture with reasonably sufficient bandwidth as well as redundant network infrastructure to mitigate the impact of individual component failure. Our security team utilizes industry standard utilities to provide defense against known common unauthorized network activity, monitors security advisory lists for vulnerabilities, and undertakes regular external vulnerability scans and audits.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e7. Data Center Environment and Physical Security. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThe Sub-Processors’ environments which are utilized by Us for hosting services in connection with Our provision of the Enterprise Services employ the following security measures:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eA security organization responsible for physical security functions 24x7x365.\u003c/li\u003e\n\u003cli\u003eAccess to areas where systems or system components are installed or stored within data centers is restricted through security measures and policies consistent with industry standards.\u003c/li\u003e\n\u003cli\u003eN+1 uninterruptible power supply and HVAC systems, backup power generator architecture and advanced fire suppression.\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch3\u003eTechnical and Organizational Enterprise Security Measures for Third-Party Service Providers Who Process Service Data\u003c/h3\u003e\n\u003cp\u003eAny third-party service providers that are utilized by the Zendesk Group will only be given access to Your Account and Service Data as is reasonably necessary to provide the Enterprise Services. Zendesk maintains a vendor security review program which assesses and manages any potential risks involved in using these third-party service providers who have access to Service Data and such third-party service providers will be subject to, among the other requirements in the \u003ca href=\"https://www.zendesk.com/company/agreements-and-terms/main-services-agreement/?_ga=2.55048683.1152014886.1686586533-1707380752.1673040982\u0026amp;_gac=1.161945038.1683846432.Cj0KCQjwpPKiBhDvARIsACn-gzCsD10kCI5b7o0424jrq8Ohg9V4FMgUisgQXnapTeN2V_838Cj_YjoaAuP3EALw_wcB\" target=\"_blank\" rel=\"noopener\"\u003eMain Services Agreement\u003c/a\u003e, their implementing and maintaining compliance with the following appropriate technical and organizational security measures:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e1. Physical Access Controls. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures, such as security personnel and secured buildings, to prevent unauthorized persons from gaining physical access to data processing systems in which Service Data is Processed.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e2. System Access Controls. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e3. Data Access Controls. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures to provide that Service Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have the privilege of access; and, that Service Data cannot be read, copied, modified, or removed without authorization in the course of Processing.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e4. Transmission Controls. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Service Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified, or removed without authorization during electronic transmission or transport.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e5. Input Controls. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e6. Data Protection. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall take reasonable measures to provide that Service Data is secured to protect against accidental destruction or loss.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e7. Logical Separation. \u003cspan\u003e\u003c/span\u003e\u003c/strong\u003eThird-party service providers shall logically segregate Service Data from the data of other parties on its systems to ensure that Service Data may be Processed separately.\u003c/p\u003e\n\u003cp\u003eThese terms were last updated on June 1, 2022.\u003c/p\u003e"; const share = ` <ul class="share"> <li> <a href="https://www.facebook.com/share.php?title=How+We+Protect+Your+Service+Data+%28Enterprise+Services%29&u=https%3A%2F%2Fsupport.zendesk.com%2Fhc%2Fen-us%2Farticles%2F4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services" class="share-facebook" aria-label="Facebook"> <svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" focusable="false" viewBox="0 0 12 12" aria-label="Share this page on Facebook"> <path fill="currentColor" d="M6 0a6 6 0 01.813 11.945V7.63h1.552l.244-1.585H6.812v-.867c0-.658.214-1.242.827-1.242h.985V2.55c-.173-.024-.538-.075-1.23-.075-1.444 0-2.29.767-2.29 2.513v1.055H3.618v1.585h1.484v4.304A6.001 6.001 0 016 0z"/> </svg> </a> </li> <li> <a href="https://twitter.com/share?lang=en&text=How+We+Protect+Your+Service+Data+%28Enterprise+Services%29&url=https%3A%2F%2Fsupport.zendesk.com%2Fhc%2Fen-us%2Farticles%2F4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services" class="share-twitter" aria-label="X Corp"> <svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" focusable="false" viewBox="0 0 12 12" aria-label="Share this page on X Corp"> <path fill="currentColor" d="M.0763914 0 3.60864 0 6.75369 4.49755 10.5303 0 11.6586 0 7.18498 5.11431 12 12 8.46775 12 5.18346 7.30333 1.12825 12 0 12 4.7531 6.6879z"/> </svg> </a> </li> <li> <a href="https://www.linkedin.com/shareArticle?mini=true&source=Zendesk+Support&title=How+We+Protect+Your+Service+Data+%28Enterprise+Services%29&url=https%3A%2F%2Fsupport.zendesk.com%2Fhc%2Fen-us%2Farticles%2F4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services" class="share-linkedin" aria-label="LinkedIn"> <svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" focusable="false" viewBox="0 0 12 12" aria-label="Share this page on LinkedIn"> <path fill="currentColor" d="M10.8 0A1.2 1.2 0 0112 1.2v9.6a1.2 1.2 0 01-1.2 1.2H1.2A1.2 1.2 0 010 10.8V1.2A1.2 1.2 0 011.2 0h9.6zM8.09 4.356a1.87 1.87 0 00-1.598.792l-.085.133h-.024v-.783H4.676v5.727h1.778V7.392c0-.747.142-1.47 1.068-1.47.913 0 .925.854.925 1.518v2.785h1.778V7.084l-.005-.325c-.05-1.38-.456-2.403-2.13-2.403zm-4.531.142h-1.78v5.727h1.78V4.498zm-.89-2.846a1.032 1.032 0 100 2.064 1.032 1.032 0 000-2.064z"/> </svg> </a> </li> </ul> `; const relatedArticles = ` <section class="related-articles"> <h2 class="related-articles-title">Related articles</h2> <ul> <li> <a href="/hc/en-us/related/click?data=BAh7CjobZGVzdGluYXRpb25fYXJ0aWNsZV9pZGwrCBpbnp%2BHBDoYcmVmZXJyZXJfYXJ0aWNsZV9pZGwrCBo0jZ%2BHBDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoIdXJsSSJaL2hjL2VuLXVzL2FydGljbGVzLzQ5ODA1NDUwNTE0MTgtSG93LVdlLVByb3RlY3QtWW91ci1TZXJ2aWNlLURhdGEtSW5ub3ZhdGlvbi1TZXJ2aWNlcwY7CFQ6CXJhbmtpBg%3D%3D--ca714a2d4a2c7ab61c371dc3bedbb85e23dcc987" rel="nofollow">How We Protect Your Service Data (Innovation Services)</a> </li> <li> <a href="/hc/en-us/related/click?data=BAh7CjobZGVzdGluYXRpb25fYXJ0aWNsZV9pZGwrCBqj6IUCBDoYcmVmZXJyZXJfYXJ0aWNsZV9pZGwrCBo0jZ%2BHBDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoIdXJsSSI6L2hjL2VuLXVzL2FydGljbGVzLzQ0MDg4ODMwNjE1MzAtU3ViLXByb2Nlc3Nvci1Qb2xpY3kGOwhUOglyYW5raQc%3D--b875a57d0cd62ec7771eecaa89a6905c86e7dcaa" rel="nofollow">Sub-processor Policy</a> </li> <li> <a href="/hc/en-us/related/click?data=BAh7CjobZGVzdGluYXRpb25fYXJ0aWNsZV9pZGwrCBoHxOlZBDoYcmVmZXJyZXJfYXJ0aWNsZV9pZGwrCBo0jZ%2BHBDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoIdXJsSSJQL2hjL2VuLXVzL2FydGljbGVzLzQ3ODQyMjA1Mzg2NTAtUHJvZmVzc2lvbmFsLVNlcnZpY2VzLVRlcm1zLWFuZC1Db25kaXRpb25zBjsIVDoJcmFua2kI--2392d7547eca726c236e7103d421f991388572cd" rel="nofollow">Professional Services Terms and Conditions</a> </li> <li> <a href="/hc/en-us/related/click?data=BAh7CjobZGVzdGluYXRpb25fYXJ0aWNsZV9pZGwrCJpL8YUCBDoYcmVmZXJyZXJfYXJ0aWNsZV9pZGwrCBo0jZ%2BHBDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoIdXJsSSJKL2hjL2VuLXVzL2FydGljbGVzLzQ0MDg4ODM2Mjg5NTQtWmVuZGVzay1TZXJ2aWNlLURhdGEtRGVsZXRpb24tUG9saWN5BjsIVDoJcmFua2kJ--80d27f06c7fb2edd68242ec3696d1c13d2612330" rel="nofollow">Zendesk Service Data Deletion Policy</a> </li> <li> <a href="/hc/en-us/related/click?data=BAh7CjobZGVzdGluYXRpb25fYXJ0aWNsZV9pZGwrCJppXJKVBDoYcmVmZXJyZXJfYXJ0aWNsZV9pZGwrCBo0jZ%2BHBDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoIdXJsSSJEL2hjL2VuLXVzL2FydGljbGVzLzUwNDA0NTIxNjgwOTAtR292ZXJubWVudC1EYXRhLVJlcXVlc3QtUG9saWN5BjsIVDoJcmFua2kK--1811dafae1612fe3db40a6819c073bc94e7e2093" rel="nofollow">Government Data Request Policy</a> </li> </ul> </section> `; const comment_count = 0; const commentCallout = `Article is closed for comments.`; const comments_disabled = true; const subscribeElementId = "ArticleSubscribe"; const subscribe = `<div data-helper="subscribe" data-json="{"item":"article","url":"/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services/subscription.json","follow_label":"Follow","unfollow_label":"Unfollow","following_label":"Following","can_subscribe":true,"is_subscribed":false}"></div>`; const vote_sum = 2; const user_avatar = "\u003cimg alt=\"\" data-user-avatar=\"true\" src=\"https://assets.zendesk.com/hc/assets/default_avatar.png\" /\u003e"; const algoliaSettings = { "algolia_default_index": "Z2", "algolia_app_id": "ZD5R2FFMZS", "algolia_api_key": "1fa9900ac9e7f6cc2dec9d5bbca0c755", "algolia_token_url": "https://judivnfptk.execute-api.us-west-2.amazonaws.com/prod/token", } const container = document.getElementById("articlePage"); const props = { darkModeSetting, baseUrlSetting, localeSetting, signedIn, algoliaSettings, breadcrumbs, author, created_at, edited_at, id, title, internal, body, attachments, share, labels, comments, comment_count, commentCallout, comments_disabled, contentTagItems, relatedArticles, subscribe, vote_sum, voteUp, voteDown, user_avatar, } renderArticlePage(props, container); </script> </main> <div id='footer'></div> <script type='module'> import { renderFooter } from "footer"; const localeSetting = "en-us"; const signedIn = false; const poweredByZendesk = document.querySelector(".powered-by-zendesk"); const settings = { "getting_started_url": "/categories/6191839589274", "help_and_faqs_url": "/categories/6191861453978", "video_url": "https://www.youtube.com/@zendesk/playlists", "zendesk_updates_url": "/categories/4405298749210", "product_guides_url": "/categories/6191910393754", "find_tips_tutorials_url": "/categories/6191850876058", "agent_guide_url": "/categories/5021364328218", "policies_programs_url": "/categories/4405298748826", }; const container = document.getElementById("footer"); const props = { localeSetting, signedIn, settings, poweredByZendesk }; renderFooter(props, container); </script> <script type='text/javascript'> (function(){var g=function(e,h,f,g){ this.get=function(a){for(var a=a+"=",c=document.cookie.split(";"),b=0,e=c.length;b<e;b++){for(var d=c[b];" "==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null}; this.set=function(a,c){var b="",b=new Date;b.setTime(b.getTime()+6048E5);b="; expires="+b.toGMTString();document.cookie=a+"="+c+b+"; path=/; "}; this.check=function(){var a=this.get(f);if(a)a=a.split(":");else if(100!=e)"v"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(":"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case "v":return!1;case "r":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(":")),!c}return!0}; this.go=function(){if(this.check()){var a=document.createElement("script");a.type="text/javascript";a.src=g;document.body&&document.body.appendChild(a)}}; this.start=function(){var t=this;"complete"!==document.readyState?window.addEventListener?window.addEventListener("load",function(){t.go()},!1):window.attachEvent&&window.attachEvent("onload",function(){t.go()}):t.go()};}; try{(new g(100,"r","QSI_S_ZN_ehsPotZjyz81wvs","https://znehspotzjyz81wvs-zendeskinc.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_ehsPotZjyz81wvs")).start()}catch(i){}})(); </script><div id='ZN_ehsPotZjyz81wvs'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div> <div class="powered-by-zendesk"> <svg xmlns="http://www.w3.org/2000/svg" width="26" height="26" focusable="false" viewBox="0 0 26 26"> <path d="M12 8.2v14.5H0zM12 3c0 3.3-2.7 6-6 6S0 6.3 0 3h12zm2 19.7c0-3.3 2.7-6 6-6s6 2.7 6 6H14zm0-5.2V3h12z"/> </svg> <a href="https://www.zendesk.com/service/help-center/?utm_source=helpcenter&utm_medium=poweredbyzendesk&utm_campaign=text&utm_content=Zendesk+Support" target="_blank" rel="nofollow">Powered by Zendesk</a> </div> <!-- / --> <script src="//static.zdassets.com/hc/assets/en-us.cacab8b2af301c81e552.js"></script> <script src="https://support.zendesk.com/auth/v2/host/without_iframe.js" data-brand-id="360002256920" data-return-to="https://support.zendesk.com/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services" data-theme="hc" data-locale="en-us" data-auth-origin="360002256920,false,true"></script> <script type="text/javascript"> /* Greetings sourcecode lurker! This is for internal Zendesk and legacy usage, we don't support or guarantee any of these values so please don't build stuff on top of them. */ HelpCenter = {}; HelpCenter.account = {"subdomain":"support","environment":"production","name":"Zendesk Support"}; HelpCenter.user = {"identifier":"da39a3ee5e6b4b0d3255bfef95601890afd80709","email":null,"name":"","role":"anonymous","avatar_url":"https://assets.zendesk.com/hc/assets/default_avatar.png","is_admin":false,"organizations":[],"groups":[]}; HelpCenter.internal = {"asset_url":"//static.zdassets.com/hc/assets/","web_widget_asset_composer_url":"https://static.zdassets.com/ekr/snippet.js","current_session":{"locale":"en-us","csrf_token":null,"shared_csrf_token":null},"usage_tracking":{"event":"article_viewed","data":"BAh7CDoLbG9jYWxlSSIKZW4tdXMGOgZFVDoPYXJ0aWNsZV9pZGwrCBo0jZ+HBDoKX21ldGF7DDoPYWNjb3VudF9pZGkD2RihOhNoZWxwX2NlbnRlcl9pZGwrCAcas9FTADoNYnJhbmRfaWRsKwgYgM7RUwA6DHVzZXJfaWQwOhN1c2VyX3JvbGVfbmFtZUkiDkFOT05ZTU9VUwY7BlQ7AEkiCmVuLXVzBjsGVDoaYW5vbnltb3VzX3RyYWNraW5nX2lkMA==--40cc7c2854f8815233806440744d8c9894a35f82","url":"https://support.zendesk.com/hc/activity"},"current_record_id":"4980543927322","current_record_url":"/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services","current_record_title":"How We Protect Your Service Data (Enterprise Services)","current_text_direction":"ltr","current_brand_id":360002256920,"current_brand_name":"Zendesk Support","current_brand_url":"https://support.zendesk.com","current_brand_active":true,"current_path":"/hc/en-us/articles/4980543927322-How-We-Protect-Your-Service-Data-Enterprise-Services","show_autocomplete_breadcrumbs":true,"user_info_changing_enabled":false,"has_user_profiles_enabled":true,"has_end_user_attachments":true,"user_aliases_enabled":true,"has_anonymous_kb_voting":false,"has_multi_language_help_center":true,"show_at_mentions":true,"embeddables_config":{"embeddables_web_widget":false,"embeddables_connect_ipms":false},"answer_bot_subdomain":"static","general_settings_url":"https://support.zendesk.com/hc/admin/general_settings?locale=en-us","user_segments_url":"https://support.zendesk.com/knowledge/user_segments?brand_id=360002256920","has_gather":true,"has_ckeditor":true,"has_community_enabled":true,"has_community_badges":true,"has_community_post_content_tagging":false,"has_gather_content_tags":true,"has_guide_content_tags":true,"has_user_segments":true,"has_answer_bot_web_form_enabled":false,"has_lookup_fields_in_guide_legacy_templates":true,"has_edit_user_profile_v2":false,"has_garden_modals":false,"theming_cookie_key":"hc-da39a3ee5e6b4b0d3255bfef95601890afd80709-2-preview","is_preview":false,"has_alternate_templates":true,"arrange_articles_url":"https://support.zendesk.com/knowledge/arrange?brand_id=360002256920","article_verification_url":"https://support.zendesk.com/knowledge/verification?brand_id=360002256920","has_article_verification":true,"guide_language_settings_url":"https://support.zendesk.com/hc/admin/language_settings?locale=en-us","docs_importer_url":"https://support.zendesk.com/knowledge/import_articles?brand_id=360002256920","content_tags_url":"https://support.zendesk.com/knowledge/content_tags?brand_id=360002256920","community_badges_url":"https://support.zendesk.com/knowledge/community_badges?brand_id=360002256920","community_settings_url":"https://support.zendesk.com/knowledge/community_settings?brand_id=360002256920","gather_plan_state":"subscribed","search_settings_url":"https://support.zendesk.com/knowledge/search_settings?brand_id=360002256920","has_search_settings_in_plan":true,"theming_api_version":4,"theming_settings":{"noindex":false,"widget_enabled":true,"dark_mode":false,"onetrust_enabled":true,"pendo_enabled":true,"survey_enabled":true,"algolia_default_index":"Z2","algolia_most_recent_index":"Rec_Z2","algolia_app_id":"ZD5R2FFMZS","algolia_api_key":"1fa9900ac9e7f6cc2dec9d5bbca0c755","algolia_token_url":"https://judivnfptk.execute-api.us-west-2.amazonaws.com/prod/token","base_url":"https://support.zendesk.com","apps_ints_url":"/categories/5283127075226","getting_started_url":"/categories/6191839589274","help_and_faqs_url":"/categories/6191861453978","product_guides_url":"/categories/6191910393754","find_tips_tutorials_url":"/categories/6191850876058","video_url":"https://www.youtube.com/@zendesk/playlists","agent_guide_url":"/categories/5021364328218","zendesk_updates_url":"/categories/4405298749210","policies_programs_url":"/categories/4405298748826","premier_form_id":"4518845822874","failover_form_id":"4546346685850","abuse_form_id":"1260805650630","conduct_form_id":"1260805677249","test_form_id":"-1","premier_control_article_id":"4594115628186","abuse_violation_field_id":"1260811540309","new_intake_control_article_id":"7299932751514","new_intake_form_id":"7299885911962","announcements_section_id":"4405298833818","release_notes_section_id":"4405298847002","whats_new_section_id":"4405298877338","zendesk_updates_category_id":"4405298749210","nebula_url":"https://nebula-prod.s3-us-west-2.amazonaws.com","brand_color":"#17494D","brand_text_color":"#FFFFFF","text_color":"#2F3941","link_color":"#1F73B7","hover_link_color":"#0F3554","visited_link_color":"#9358B0","background_color":"#FFFFFF","heading_font":"-apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif","text_font":"-apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif","logo":"/hc/theming_assets/01HYDGNXBBRM9S576V92TTD3KV","favicon":"/hc/theming_assets/01HYDGNXGC3R8PAHSCTJC3T9WX","instant_search":true,"scoped_kb_search":true,"scoped_community_search":true,"show_recent_activity":true,"show_articles_in_section":true,"show_article_author":true,"show_article_comments":true,"show_follow_article":true,"show_recently_viewed_articles":true,"show_related_articles":true,"show_article_sharing":true,"show_follow_section":true,"show_follow_post":true,"show_post_sharing":true,"show_follow_topic":true,"request_list_beta":false},"has_pci_credit_card_custom_field":true,"help_center_restricted":false,"is_assuming_someone_else":false,"flash_messages":[],"user_photo_editing_enabled":true,"has_docs_importer":false,"user_preferred_locale":"en-us","base_locale":"en-us","has_end_user_session_renewal":true,"has_user_session_cookie_enabled":true,"has_end_user_2fa":true,"has_custom_statuses_enabled":true,"has_generative_answers_in_help_center":true,"has_hc_generative_answers_setting_enabled":false,"has_intl_date_format_enabled":false,"has_guide_service_catalog":false,"version":"v25448"}; </script> <script src="//static.zdassets.com/hc/assets/hc_enduser-d68384437d39435a7330ccf84a2862c6.js"></script> <script type="text/javascript" src="/hc/theming_assets/10557657/360002256920/script.js?digest=8329826791578"></script> </body> </html>