Data Security Policy for Mirrorlake Software Cloud Apps
At Mirrorlake Software, we prioritize the security and privacy of our users' data above all else. As a trusted app vendor for Atlassian Cloud products, we understand the importance of maintaining the integrity and confidentiality of sensitive information within cloud environments. Our commitment to data security is reflected in the design and implementation of our cloud apps.
Cloud Fortified
Our cloud apps are meticulously engineered to ensure robust security measures within the cloud infrastructure. For this our cloud apps have the “cloud fortified” badge from Atlassian.
Find more information about the cloud fortified program here:
https://www.atlassian.com/blog/add-ons/introducing-cloud-fortified
https://developer.atlassian.com/platform/marketplace/cloud-fortified-apps-program/
Non-Storage of User Data
Unlike some other platforms, Mirrorlake Software cloud apps do not store any user data on our own servers. We operate on a zero-storage policy, meaning that all user data remains within the Atlassian Cloud environment. This approach minimizes the risk of data breaches and unauthorized access, as sensitive information never leaves the trusted confines of the Atlassian ecosystem.
Encryption
To further enhance data security, we employ strong encryption mechanisms to safeguard data transmission and storage. All communication between our cloud apps and the Atlassian Cloud platform is encrypted using industry-standard protocols, ensuring that data remains protected both in transit and at rest.
Compliance
Mirrorlake Software is committed to complying with relevant data protection regulations and standards. Our data security practices align with industry regulations such as GDPR and others, ensuring that user data is handled with the utmost care and in accordance with applicable laws.
More information about GDPR handling can be found here:
https://mirrorlake.eu/mirrorlake_info.html#privacy_en
Continuous Monitoring and Auditing:
We continuously monitor our cloud infrastructure and applications for any suspicious activities or anomalies. Through proactive monitoring and regular audits, we promptly identify and address potential security threats, thereby maintaining the integrity and security of our cloud apps.
Monitoring includes:
App availability Monitor
Malware protection scans
At Mirrorlake Software, we are committed to providing our customers with cloud apps that not only deliver exceptional functionality but also prioritize the security and privacy of their data. Through stringent security measures, adherence to industry standards, and a dedication to continuous improvement, we strive to maintain the trust and confidence of our users in an ever-evolving digital landscape.