Security Policy

Security Policy for Jira App “Sub Task Board”

Introduction

The Jira App “Sub Task Board” (hereafter referred to as "the App") is designed to enhance the functionality of Atlassian Jira by providing additional features. The App does not store, process, or transmit any user or project data outside of Jira. This security policy outlines the measures and practices implemented to ensure the security and privacy of our users.

Data Handling

  1. No Data Storage: The App does not store any user or project data. All operations are performed within the Jira environment, and no data is extracted, transmitted, or stored on external servers.

  2. No Data Processing: The App solely enhances the user interface and provides additional functionality within Jira. It does not process or modify any Jira data.

  3. No Data Transmission: The App does not transmit any data outside the Jira environment. All communications occur within the secure context of the Atlassian platform.

Security Measures

  1. Authentication and Authorization: The App relies on Jira's built-in authentication and authorization mechanisms. Users must have the necessary permissions within Jira to access the App's features.

  2. Environment Security: The App operates entirely within the Jira environment, leveraging Atlassian's security infrastructure. This includes adherence to Atlassian's security policies and compliance standards.

  3. Data Access Control: Since the App does not store or process data, there is no need for additional data access controls. The App adheres to Jira's existing access control mechanisms.

  4. Code Security: The App undergoes regular security reviews and testing to ensure it is free from vulnerabilities. We follow secure coding practices and conduct regular code audits.

  5. Third-Party Integrations: The App does not integrate with any third-party services or APIs that would require data transmission outside of Jira.

Incident Response

  1. Monitoring: While the App does not handle data, we continuously monitor its performance and security to detect and address any potential issues promptly.

  2. Incident Management: In the unlikely event of a security incident, we have established protocols to investigate and resolve the issue swiftly. Users will be informed of any incidents that may impact their use of the App.

  3. Vulnerability Management: We are committed to maintaining the security of the App by promptly addressing any identified vulnerabilities through regular updates and patches.

User Responsibility

  1. Access Control: Users are responsible for managing access to their Jira environment and ensuring that only authorized individuals can use the App.

  2. Reporting Issues: Users are encouraged to report any security concerns or issues related to the App to our support team for immediate investigation and resolution.

Contact Information

If you have any questions or concerns regarding the security of Jira App “Sub Task Board”, please contact our security team at info@bernhard-renner.com.

Conclusion

We are committed to ensuring the security and privacy of our users. By following this security policy, we aim to provide a secure and reliable experience for all users of Jira App “Sub Task Board”.