• 로그인
  • 제품 지원
  • 회사
    • 회사 소개
    • 언론 관련
    • 투자자 정보
    • 이벤트
    • 채용 정보
    • 다양성과 포용
    • 사회적 영향력
    • 법적 사항
  • 문의하기
  • 영어
    • English (US)
    • English (UK)
    • Español
    • Español (LATAM)
    • Português
    • Français
    • Deutsch
    • Italiano
    • Nederlands
    • 日本語
    • Pусский
    • 한국어
    • 繁體中文 (台灣)
    • 繁體中文 (香港特區)
    • ไทย
  • Zendesk. 고객이 원하는 회사가 되세요.
  • 모바일 메뉴 토글
  • 제품
    제품

    Support Suite

    상담원이 어떤 문제든 해결할 수 있도록 지원하는 전체 서비스 솔루션입니다.

    Sales Suite

    최신 영업 솔루션

    • Support

      통합 고객 지원

    • Guide

      지식창고 및 스마트 셀프 서비스

    • Chat

      실시간 채팅 및 메시징

    • Talk

      콜 센터 소프트웨어

    • Sell

      영업 CRM

    • Explore

      애널리틱스 및 보고 기능

    • Gather

      커뮤니티 포럼

    플랫폼
    • Zendesk Sunshine

      최고의 고객 경험을 구축할 수 있는 개방적이고 유연하며 강력한 Zendesk 플랫폼

    • Sunshine Conversations

      인터랙티브 메시징 사용 환경을 구축할 수 있는 Sunshine의 새로운 기능

    • 마켓플레이스

      앱, 연동 서비스 및 파트너 찾아보기

  • 가격
  • 솔루션
    업종
    • 교육
    • 금융 서비스
    • 정부
    • 의료
    • 제조
    • 미디어
    • 소매업
    • 소프트웨어
    • 통신
    회사 유형
    • 엔터프라이즈
    • 중소기업
    • 스타트업 회사
    사용 사례
    • 원격 지원
    • 셀프 서비스
    • 옴니채널
    • 내부 헬프 데스크
    • 영업 CRM
  • 데모
  • 서비스
  • 리소스
    • 라이브러리

      뉴스, 팁 및 성공 사례

    • API 및 개발자

      Zendesk로 개발하는 데 대한 정보

    • 웨비나

      어디서든 알아보세요

    • 파트너

      Zendesk 파트너가 되거나 파트너를 찾는 방법

    • 이벤트

      안전하게 사회적 거리를 두고 만나요

    • 고객 사례

      Zendesk와 함께 어떤 성공을 이룰 수 있는지 보세요.

  • 회사
    • 문의하기
    • 회사 소개
    • 언론 관련
    • 투자자 정보
    • 이벤트
    • 채용 정보
    • 다양성과 포용
    • 사회적 영향력
    • 법적 사항
  • 언어
    • English (US)
    • English (UK)
    • Español
    • Español (LATAM)
    • Português
    • Français
    • Deutsch
    • Italiano
    • Nederlands
    • 日本語
    • Pусский
    • 한국어
    • 繁體中文 (台灣)
    • 繁體中文 (香港特區)
    • ไทย
  • 시작하기
  • 로그인

법적 정보 및 리소스

  • 고객 및 파트너
  • 정책 및 절차
  • 상표 및 지적 재산
  • 조달 및 공급업체
  • 개인정보 및 데이터 보호
고객 및 파트너
  • 개인정보 보호방침
  • Master Subscription Agreement
  • Innovation Services List
  • How We Protect Your Service Data (Enterprise Services)
  • How We Protect Your Service Data (Innovation Services)
  • 애플리케이션 개발자 및 API 사용권 계약
  • Reseller Subscription Services Agreement
  • Marketplace Terms of Use
  • Candidate Privacy Notice

How We Protect Your Service Data (Enterprise Services)

The Zendesk Group is committed to providing a robust and comprehensive security program for Enterprise Services, including the security measures set forth in these Supplemental Terms (“Enterprise Security Measures”). During the Subscription Term, these Enterprise Security Measures may change without notice, as standards evolve or as additional controls are implemented or existing controls are modified as We deem reasonably necessary.

Enterprise Security Measures Utilized by Us

We will abide by these Enterprise Security Measures to protect Service Data as is reasonably necessary to provide the Enterprise Services:

1. Security Policies and Personnel. We have and will maintain a managed security program to identify risks and implement preventative technology, as well as technology and processes for common attack mitigation. This program is and will be reviewed on a regular basis to provide for continued effectiveness and accuracy. We have, and will maintain, a full-time information security team responsible for monitoring and reviewing security infrastructure for Our networks, systems and services, responding to security incidents, and developing and delivering training to Our employees in compliance with Our security policies.

2. Data Transmission. We will maintain commercially reasonable administrative, physical and technical safeguards to protect the security, confidentiality, and integrity of Service Data. These safeguards include encryption of Service Data at rest and in transmission with Our user interfaces or APIs (using TLS or similar technologies) over the internet, except for any Non-Zendesk Service that does not support encryption, which You may link to through the Enterprise Services at Your election.

3. Audits and Certifications. Upon Subscriber’s request, and subject to the confidentiality obligations set forth in this Agreement, Zendesk shall make available to Subscriber that is not a competitor of Zendesk (or Subscriber’s independent, third-party auditor that is not a competitor of Zendesk) information regarding Zendesk’s compliance with the obligations set forth in this Agreement in the form of the Zendesk’s ISO 27001 certification and/or SOC 2 (under appropriate non-disclosure protections), or SOC 3 reports.

4. Incident Response. We have an incident management process for security events that may affect the confidentiality, integrity, or availability of Our systems or data that includes a response time under which Zendesk will contact its subscribers upon verification of a security incident that affects Your Service Data. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. The incident response program includes 24×7 centralized monitoring systems and on-call staffing to respond to service incidents. Unless ordered otherwise by law enforcement or government agency, You will be notified within seventy-two (72) hours of a Service Data Breach. “Service Data Breach” means an unauthorized access or improper disclosure that has been verified to have affected Your Service Data.

5. Access Control and Privilege Management. We restrict administrative access to production systems to approved personnel. We require such personnel to have unique IDs and associated cryptographic keys and/or use of complex ephemeral tokens. These keys and/or tokens are used to authenticate and identify each person’s activities on Our systems, including access to Service Data. Upon hire, Our approved personnel are assigned unique ID’s and credentials. Upon termination of personnel, or where compromise of such credentials is suspected, these credentials are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know basis to match access privileges to defined responsibilities.

6. Network Management and Security. The Sub-Processors utilized by Us for hosting services maintain industry standard fully redundant and secure network architecture with reasonably sufficient bandwidth as well as redundant network infrastructure to mitigate the impact of individual component failure. Our security team utilizes industry standard utilities to provide defense against known common unauthorized network activity, monitors security advisory lists for vulnerabilities, and undertakes regular external vulnerability scans and audits.

7. Data Center Environment and Physical Security. The Sub-Processors’ environments which are utilized by Us for hosting services in connection with Our provision of the Enterprise Services employ the following security measures:

  • A security organization responsible for physical security functions 24x7x365.
  • Access to areas where systems or system components are installed or stored within data centers is restricted through security measures and policies consistent with industry standards.
  • N+1 uninterruptible power supply and HVAC systems, backup power generator architecture and advanced fire suppression.

Technical and Organizational Enterprise Security Measures for Third-Party Service Providers Who Process Service Data

Any third-party service providers that are utilized by the Zendesk Group will only be given access to Your Account and Service Data as is reasonably necessary to provide the Enterprise Services. Zendesk maintains a vendor security review program which assesses and manages any potential risks involved in using these third-party service providers who have access to Service Data and such third-party service providers will be subject to, among the other requirements in the Master Subscription Agreement, their implementing and maintaining compliance with the following appropriate technical and organizational security measures:

1. Physical Access Controls. Third-party service providers shall take reasonable measures, such as security personnel and secured buildings, to prevent unauthorized persons from gaining physical access to data processing systems in which Service Data is Processed.

2. System Access Controls. Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.

3. Data Access Controls. Third-party service providers shall take reasonable measures to provide that Service Data is accessible and manageable only by properly authorized staff, direct database query access is restricted and application access rights are established and enforced to ensure that persons entitled to access Service Data only have access to Service Data to which they have the privilege of access; and, that Service Data cannot be read, copied, modified, or removed without authorization in the course of Processing.

4. Transmission Controls. Third-party service providers shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Service Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified, or removed without authorization during electronic transmission or transport.

5. Input Controls. Third-party service providers shall take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.

6. Data Protection. Third-party service providers shall take reasonable measures to provide that Service Data is secured to protect against accidental destruction or loss.

7. Logical Separation. Third-party service providers shall logically segregate Service Data from the data of other parties on its systems to ensure that Service Data may be Processed separately.

These terms were last updated on December 1, 2020.

Zendesk 제품
  • Support Suite
  • Sales Suite
  • Support
  • Guide
  • Chat
  • Talk
  • Sell
  • Explore
  • Gather
  • Sunshine
  • Sunshine Conversations
  • 연동 서비스 및 앱
  • 제품 업데이트
인기 기능
  • 고객 서비스 소프트웨어
  • 티켓 작성 시스템
  • 지식창고
  • 커뮤니티 포럼
  • 헬프 데스크 소프트웨어
  • 보안
  • 기술 사양
리소스
  • 제품 지원
  • 데모 신청
  • 라이브러리
  • 웨비나
  • 교육
  • 서비스 및 파트너
  • Relate by Zendesk
  • 웨비나
  • 고객 사례
  • 서비스
회사
  • 회사 소개
  • 언론 관련
  • 투자자 정보
  • 채용 정보
  • 다양성과 포용
  • 사회적 영향력
  • 문의하기
  • 사이트맵
  • 시스템 상태
  • 제품 도움말
  • 법적 사항
즐겨 찾는 항목
  • 엔터프라이즈용 Zendesk
  • 스타트업 회사를 위한 Zendesk
  • Zendesk 벤치마크
  • 소규모 기업을 위한 Zendesk
  • 가트너 CRM 매직 쿼드런트
  • 고객 경험 트렌드
메일 발송 목록에 등록

Zendesk 뉴스레터를 수신하세요.

올바른 이메일 주소를 입력하세요.
가끔 Zendesk 제품 및 서비스에 관한 이메일도 보내 주세요. (언제든 수신 취소할 수 있습니다.)
옵션을 선택하세요.

클럽에 오신 것을 환영합니다!

죄송합니다. 문제가 발생했습니다.

페이지를 다시 로드한 후 다시 시도하거나 support@zendesk.com으로 바로 이메일을 보내실 수 있습니다.

이용약관 개인정보 보호방침 쿠키 정책 ©Zendesk 2021