On this page, you will find details on how we secure our clients' data. If you think something is missing or you have any security related questions please let us know at Spartez Support Portal or email@example.com.
Asset Tracker come with inbuilt analytics. Only statistical and/or anonymous add-on usage data is collected by Asset Tracker. It helps the team at Spartez optimize the solution and implement even better future versions. This includes, but is not limited to: your IP address, the type of Internet browsers you use, your license no (SEN) and information about the way in which you use this Product.
All analytics can be disabled via your Jira's privacy settings, see here for detailed instructions.
What data are read and stored by Asset Tracker
Asset Tracker stores the following data in its internal database:
- asset name
- asset image
- other asset fields values
- folder structure
- asset history
- asset types
- field types
- link types
- printable labels settings
- user synchronization settings
- SSH discovery profiles
- access management configuration
- operation sequence definitions
- saved search queries
- visible fields templates
Asset Tracker may store the following data in Jira issues:
- custom fields with asset, asset category and asset type
- links to assets
Asset Tracker provides feedback and bug report forms that gather the following data:
- feedback content
- information about person raising the request:
- full name
- IP address
- environment details (user agent, page URL)
Provided feedback is handled using Spartez support channel.
How is data secured?
The code of Asset Tracker is downloaded from Atlassian Marketplace directly to Jira. The only exception is the code used for feedback and bug report forms, which is downloaded from jira.spartez.com server. All the configuration data of Asset Tracker is stored on Jira and never leaves it.
Asset Tracker provides Android and iOS applications for scanning asset labels. Both these apps store profile configurations on the mobile device, including Jira URL, login and password.
SSH and WMI discovery applications
The discovery applications for MacOS and Windows store Jira credentials and scanning configuration on the computer on which they're used.
Personal data subprocessors
- Amazon Web Services - provides required infrastructure for bug report and feedback form