Data Security - Actonic – Unfolding your potential
All Posts Agile Atlassian Best Practises Atlassian Cloud Data Security Incident Management IT News Release Notes Time- & Resource Management

Data Security

We take over Communardo’s user anonymization apps!

We're taking over Communardo's user anonymization apps! This expands our data protection portfolio with two great tools. What's next for you as a Communardo customer? Find out in this article. Read it now!
Read more...

Anonymize Jira users: the ultimate guide

As a Jira administrator, there comes a time when you need to delete personal user data, but want to keep the content in the tickets. Anonymizing Jira users manually is a time-consuming and error-prone task. In this article with amazing visual content, we’ll give you the ultimate Jira anonymizing guide you have always been looking for!
Read more...

The most common data security pitfalls – and how to avoid them

Data protection violations are subject to heavy penalties by the supervisory authority. It's annoying when a violation of the GDPR happens unintentionally. Therefore, find out about the most common data security pitfalls in this article. We will show you how to avoid them!
Read more...

Order processing according to GDPR article 28

The order processing of data is legally secured in GDPR article 28. But what does that mean, and what are the consequences for your company? Order processing comes into play whenever a company is commissioned to process personal data. In this article, you will find out what you have to consider when handling this data according to Art. 28 and why a data processing agreement is essential!
Read more...

Article 15 GDPR with Atlassian products: The access right in Jira & Confluence

To properly handle the right of access in the two softwares, the Atlassian ecosystem in Jira and Confluence provides capabilities built into the softwares and the apps "GDPR (GDPR) and Security for Jira and Confluence". In this article, we will introduce you to the two ways to properly handle requests related to the right of access.
Read more...