Important: Asset Tracker End of Life Announcement (31 Jan 2022)

Software products born and die. We, at Spartez Software, have decided to discontinue the development of Asset Tracker and focus on new opportunities. Please check the End-of-Life announcement for more details. 

On this page, you will find details on how we secure our clients' data. If you think something is missing or you have any security related questions please let us know at Spartez Software Support Portal or


Asset Tracker come with inbuilt analytics. Only statistical and/or anonymous add-on usage data is collected by Asset Tracker. It helps the team at Spartez Software optimize the solution and implement even better future versions. This includes, but is not limited to: your IP address, the type of Internet browsers you use, your license no (SEN) and information about the way in which you use this Product.

All analytics can be disabled via your Jira's privacy settings, see here for detailed instructions.

What data is read and stored by Asset Tracker

Asset Tracker stores the following data in its internal database:

Asset data

  • asset name
  • asset image
  • other asset fields values
  • folder structure
  • asset history

Configuration data

  • asset types
  • field types
  • link types
  • printable labels settings
  • user synchronization settings
  • SSH discovery profiles
  • access management configuration

Other data

  • operation sequence definitions
  • saved search queries
  • visible fields templates

Issue data

Asset Tracker may store the following data in Jira issues:

  • custom fields with asset, asset category and asset type
  • links to assets

How is data secured?

The code of Asset Tracker is downloaded from Atlassian Marketplace directly to Jira. All the configuration data of Asset Tracker is stored on Jira and never leaves it.

Mobile apps

Asset Tracker provides Android and iOS applications for scanning asset labels. Both these apps store profile configurations on the mobile device, including Jira URL, login and password.

SSH and WMI discovery applications

The discovery applications for MacOS and Windows store Jira credentials and scanning configuration on the computer on which they're used.

Services providers

Personal data subprocessors 

Other services 

  • No labels