Juniper Contrail Service Orchestration Privacy Notice Supplement
This notice is provided as a supplement to the Juniper Privacy Notice. In order to understand the personal data processing practices relevant for a particular Juniper Product, you should read both the Juniper Privacy Notice and any applicable Juniper Product supplement. Any terms not defined in this Supplement are defined in the Juniper Privacy Notice. In the event of a conflict between the terms of this Supplement and the Juniper Privacy Notice, this Supplement shall control to the extent of the conflict.
This Juniper Contrail Service Orchestration Privacy Notice Supplement describes our practices with respect to how personal data is processed by Juniper Networks in connection with the provision of the Juniper Contrail Service Orchestration (CSO) service. For information on CSO, please visit our CSO Website.
Personal Data Processed
As part of the onboarding of new customers to CSO, CSO requires customer username (first name, last name, and email address). Additional information that may be collected includes site name and metadata from managed devices such as IP address of source and destination and application or websites accessed.
Purposes of Processing Personal Data
CSO includes a web-based management interface to visualize and automate the provisioning and management of devices running within the SD-WAN environment. CSO analyzes logs generated by SD-WAN network devices to provide powerful analytics regarding websites and applications used on an SD-WAN. CSO does not analyze traffic data transmitted through an SD-WAN. It only analyzes network device logs configured by the customer and sent to CSO.
Retention of Personal Data
CSO retains logs, such as access, incident, and device logs, for one to 30 days, or in select cases, based on the duration of a customer’s tenancy. These logs are available to customers via API or the CSO platform. Customers may earlier purge some of these logs.
Security of Personal Data
All device communication between CSO and the customer’s device is via secure protocols (SSH, SSL, TLS) and authenticated. The information we collect, including device configurations, is hosted on services which have certified security technologies and procedures in place to ensure integrity and security of customer data (e.g., data separation, physical security, encryption of data in transit and rest and role-based access control).
Limited Juniper Access to Data
CSO is designed to give customers options for whether Juniper may access the customer’s CSO data for support or trouble-shooting purposes.
Changes to this Supplement
We may update this Supplement from time to time to reflect any changes in our CSO personal data processing practices.