We take data security very seriously so we use only trusted service providers with the highest security standards. On this page, you will find details on what data we store, where we store it and how we secure it. If you think something is missing or you have any security related questions please let us know at Spartez Support Portal or firstname.lastname@example.org.
- providers with this label are our data sub-processors as defined by European General Data Protection Regulation (GDPR)
Canned Responses application runs on Heroku environment. Besides the application itself, Heroku stores application access logs that contain user IP, user key, instance URL and user JWT token. These logs are purged after 7 days.
Heroku Postgres stores data provided during the installation handshake. Stored keys authenticate us to clients' instances.
The database is secured using a security mechanism provided by Heroku. See https://www.heroku.com/policy/security#postgres for details.
- A key that identifies Jira instance.
- Shared secrets for communication with Jira.
We use Heroku addon mLab MongoDB
to store the templates. Each Jira instance uses a separate collection. Only users from particular Jira instance can access the templates from that instance.
The database is backed up every week and 8 last backups are stored.
- template name and content
- template creator's user key
- templates scopes including project ids and user keys
- template creation and update time
- client's license SEN
|title||We store the minimal amount of data needed to provide our service.|
We don't store issue summaries, descriptions, comments nor other sensitive information. We don't store full usernames nor e-mails but we use user keys and project keys provided by Jira instead.
We use Heroku addon Papertrail
to store application logs. Logs are in the system for 7 days. Log archives are stored from the last 365 days. Papertrail allows us to detect suspicious patterns in the logs and notify us whenever they are detected which improves our reaction time. It also allows us to analyze application's behavior after an incident occurs.
- Access log - web addresses accessed by user browser when communicating with Canned Responses add-on. It includes following data:
- request date
- IP address
- issue id
- user key and user id
- URL that the application was run on (includes Jira URL, JQL query, project key, and issue key)
- user authorization token
- browser name and version
- Application logs - internal application messages that don't contain any personal data.
|title||We analyse application logs only to monitor application health and to do post-incident analysis|
If you would like us to skip processing logs from your instance, please let us know at email@example.com.
For the better understanding of our clients, we collect anonymous statistics of the add-on usage. These statistics tell us how we should develop our plugin to make our customers happy.
What is collected
The following table is intended to give you a complete understanding of the policy that we use to collect analytics data.