Privacy and Personally Identifiable Information (PII)

Processes that help keep personal information safe. For additional privacy information, see the Adobe Privacy Center.

PII Data: Audience Manager contractually prohibits customers and data partners from sending PII information into our system. Additionally, the Unique User ID (UUID) does not contain or use PII data as part of the ID-generation algorithm.

IP Addresses: Audience Manager does collect IP addresses. IP addresses are used in data-processing and log-aggregation processes. They are also required for geographic/location look-ups and targeting. Additionally, all IP addresses within retained log files are obfuscated within 90 days.

Data Partitioning

Processes that help protect data owned by individual clients.

Trait Data Partitioning: Your data (traits, IDs, etc.) is partitioned by client. This helps prevent accidental information exposure between different clients. For example, trait data in cookies is partitioned by customer and stored in a client-specific sub-domain. It cannot be read or used accidentally by another Audience Manager client. Furthermore, trait data stored in the Profile Cache Servers (PCS) is also partitioned by customer. This prevents other clients from accidentally using your data in an event call or other request.

Data Partitioning in Reports: Client IDs are part of the identifying key in all reporting tables and report queries are filtered by ID. This helps prevent your data from appearing in the reports of another Audience Manager customer.

Inbound Server-to-Server (S2S) Transfers

Adobe Audience Manager supports two main methods of transferring S2S on-boarded data files to our systems:

Both methods are designed with the security of our customer and partner data in mind while data is in flight between their systems and our system.

SFTP: For the SFTP option, most customers choose to deliver files via the Secure FTP (SFTP) protocol, which uses the Secure Shell (SSH) protocol. This method ensures that files are encrypted while in flight between the customer’s systems and Adobe’s system. For each customer, we create a jailed drop-box location on our SFTP servers, which is tied to a user account on that system. Only the customer’s credentialed and privileged internal system users can access this jailed drop-box location. This jail is never accessible to other customers.

Amazon Web Services S3 via HTTPS: For the S3 delivery option, we recommend that all customers configure their S3 clients to use the HTTPS encryption method for file transfers (this is not the default, so it must be explicitly configured). The HTTPS option is supported both by the s3cmd command line tool as well as the S3 libraries available in every major programming language. With this HTTPS option enabled, customer’s data is encrypted while in flight to our systems. For each customer, we create a separate S3 bucket sub-directory that can be accessed only by that customer’s credentials and those of our internal system users.

To add PGP encryption to your data files, see File PGP Encryption for Inbound Data Types.

Protecting Data by Escaping

Note that Audience Manager does not escape outgoing data to secure it against possible cross-site scripting (XSS), etc. It is the responsibility of the client to escape incoming data.

HTTP Strict-Transport-Security

HTTP Strict-Transport-Security (HSTS) is an industry-wide web security mechanism which helps protect against cookie hijacking and protocol downgrade attacks.

The policy instructs the web browser that once a secure HTTPS call was made to a given domain, no subsequent unsecure calls (HTTP) should be allowed to that domain. This protects against man-in-the-middle attacks, where an attacker might try to downgrade HTTPS calls to unsecured HTTP calls.”

This policy improves data security between clients and Adobe Edge servers.

Example

Let’s say the yourcompany.demdex.com domain sends traffic to the DCS via HTTP. HSTS upgrades the calls to use HTTPS instead, and all subsequent DCS calls coming from yourcompany.demdex.com will use HTTPS instead of HTTP.

See HTTP Strict Transport Security - Wikipedia for more information about HSTS.

de293fbf-b489-49b0-8daa-51ed303af695