Optimizely Content Management System (CMS) Core logs system activities such as events and system errors.
From CMS Core 11.4.0, log files do not include any Personally Identifiable Information (PII), such as usernames or IP addresses. See Write log messages for logging configuration in CMS 12.
Optimizely Digital Experience Platform (DXP) secures access to stored PII in several ways. All content stored in DXP is encrypted at rest, access to the underlying storage technologies and infrastructure is restricted to Optimizely personnel, and access to the website is secured through the included Web Application Firewall. Most vulnerabilities are usually found in the application layer, so we strongly recommend running regular scans of all sites using the optional Web Vulnerability Scanner, or similar technology of your own choosing.
CMS relies on SQL server for most of its storage needs, so you should restrict access to SQL server and use the built-in encryption capabilities to protect PII data at rest.
The built-in profile system does not track PII by default but can certainly be used that way. If you choose to store PII in the profile system, ensure the underlying storage is appropriately protected (encryption, regular vulnerability scanning, and so on) and that consent is explicitly given by users represented by the profiles.
The profile system provides the ability to query and update profiles.
Unless you have added your own or third-party visitor group criteria, you should not have any PII collected by visitor groups, and so no data to correct or query here. Anything stored in cookies can of course be deleted by the visitor by clearing cookies.
See also Fetching & updating data.
Data deleted from the underlying storage is deallocated and physically deleted through NIST certified methods. All deallocated data is physically deleted within at most 180 days.
See also Deleting data.
Updated 19 days ago