Data privacy and security

Data privacy

Your privacy is important to us, and so is being transparent about how we collect, use, and share information about you.

What information we collect

What kind of data are stored by the plugin

  • Installation data sent by Jira during the installation process

  • Issue keys when user is creating or opening the plugin dialog window

  • Atlassian user ids of users who join to the room

  • Configured Jira issue field id for saving estimated points

  • We may collect some data when an error occurs in the application, such as
    - The place in the code where an error has been thrown ( stacktrace)
    - Error message or error code if an error occurred during sending the request

What kind of data are read from the Jira instance

The plugin reads some additional data by the javascript and exists only in the user’s browser:

  • The list of fields in the issue - read by the browser during the configuration process, only id of chosen field is saved on the server

  • Full name of the users joined to the room - read only by the browser in order to display the list of the team members. Full name exists only in the browser and never is saved on the server. Backend part of the plugin holds only id of the users who joined to the room

When the Room owner press “Remove room” button, data such as : team member (Atlassian account id, issue field id, issue key and whole room configuration are deleted.

Any requests regarding the data collected in the Product please to support@liquitim.com

How we use the information we collect

  • We use collected information to serve the Product to you and are necessary.

  • We are using the error related data to improve the Product and quickly fixing the bugs discovered in the application

Data residency

Agile Toolbox for Jira has instances in two zones:

  • US

  • EU

During the installation of the plugin Jira is automatically choosing the data residency based on the user’s request or Jira instance location.

Security

We use industry standard technical and organizational measures to secure the information we store by choosing Google Cloud as our infrastructure provider. This cloud provider gives us “out of the box”

  • secure-by-design infrastructure

  • encryption data at rest and encryption data at transit by default

  • well defined privacy policy

  • advanced access management

 

How we keep the Product safe

Environments

Development, test and production environment are isolated. None of the code or data is able to use other’s environment resources or have access to the data on different environment.

Limiting access

All accounts to the infrastructure or source code all secured by the 2-factor authentication with password policy retention. Permission granted to the account are periodically reviewed to make sure that they have access only to the infrastructure, code or data required to work

Source code security

  • All code changes ( pull requests) have to be reviewed and accepted

  • Deployment procedure are automated ( devops pipelines), thanks to that access to the production environments are limited and the risk of a “human error” causing Product unavailability is avoided

  • Security scanners are included in the devops pipelines ( build process) to make sure that security bugs will be quickly discovered and removed