Created Dec 2, 2020, Last active today
... More tips to help you fulfill the role of a DPO Grow your personal network Knowledge is power. This is especially true for DPOs. Therefore, regularly exchange tips for s...
Hi folks! I’m a Product Manager for Confluence Permissions, working on the Public Links feature. Public links allow Confluence users to generate a URL to share a view-only v...
With BYOK recently in Early Access for Atlassian, more and more companies are enabling this feature. This post is an introduction for admins who don't have experience with key management or AWS. ...
...ookies, and more. Publicly available information derived from government agencies or records, such as professional licenses and public property records, are not covered by CCPA. How can you check w...
Atlassian’s Trust team now have now completed our response for FINMA (Financial Market Supervisory Authority; Switzerland) Guidance for our Cloud products. What is FINMA? The Swiss ...
...ealth systems, but their suppliers. Regardless of how the healthcare data breach is caused, once more than 500 individuals are affected, your organization is placed in the public pillory, the&n...
...public repository by the employee. As such, the hacking group had access to data visible via the employee account which included the published office floor plans and public Envoy profiles of other A...
An Atlassian data privacy milestone: Jira Cloud and Confluence Cloud are now HIPAA-compliant. Atlassian recently published a guide to HIPAA compliance. Together with this knowledge, our ins...
...umber Biometric information Job data Educational information or browsing history What is not covered by CCPA Publicly available information, like that found in g...
Need to understand since it will not be in 23, what is the new timeline?
The CCPA data privacy law was established in California to criminalize data theft and provide more control for its residents over their collected personal data by companies that fall under its j...
Hello Community! Are you a Security Team leader at a large organization? We want to invite you to participate in one-on-one research interviews. What’s involved in the research: A 90 minute...
Hi everyone! It’s a new year and we’re thrilled to announce the progress we’ve made across three key HIPAA initiatives: HIPAA for Jira Service Management on Enterprise Plan has launched and is ...
Gathering data is one of the leading resources that benefit businesses in analyzing their customers' needs, which helps improve their products to fit and satisfy the marketplace. Yet, it triggers a m...
The California Consumer Privacy Act CCPA was established as a law by the state legislator on June 28, 2018, to protect the consumer’s privacy throughout the golden state. CCPA went int...
Hello, We are a small business who have been using Jira Server with 25 licenses. Our team size is increasing and we need additional licenses, but can't move to the cloud yet due to security reasons. ...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23529
We maintain an always-on bug bounty to identify and triage issues in our products and services. Many customers ask us for ‘penetration reports’ or similar - basically a report from a third party that...
Hello, We are currently conducted financial statements audit by accounting firm. Our auditors have required the SOC1 Type2 report of all significant service organizations including Atlassian....
January 4, 2023 Overview The Health Insurance Portability and Accountability Act (HIPAA) is a federal law developed by the U.S. Department of Health and Human Services and was established in 1996...
January 4th 2023 Overview The International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 167 national stand...
Wo kann ich als Admin in den Account-Einstellungen aller Nutzer für die angeschlossenen APPs/AddOns einstellen, dass die jeweiligen Anbieter keinen Zugriff auf das Nutzerkonto haben? Wenn ich den RE...
...roviding cybersecurity guidance in order to help reduce the risk of harm resulting from cybersecurity incidents to public and private sector networks in the UK. To view our latest guidance to N...
Atlassian primarily relies on our Atlassian Bug Bounty Program and our own internal testing by our Security Engineers to test and identify security issues or vulnerabilities in our Products and Servi...
Overview System and Organization Controls (SOC) Reports are independent third-party examination reports that provide detailed information and assurance about controls in place at service organizati...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard