{"id":6899,"date":"2022-03-03T13:39:36","date_gmt":"2022-03-03T12:39:36","guid":{"rendered":"https:\/\/www.actonic.de\/verletzung-des-schutzes-personenbezogener-daten-in-jira-und-confluence\/"},"modified":"2023-03-31T10:56:18","modified_gmt":"2023-03-31T08:56:18","slug":"violation-of-the-protection-of-personal-data-in-jira-or-confluence","status":"publish","type":"post","link":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/","title":{"rendered":"Violation of the protection of personal data in Jira or Confluence &#8211; How to deal with data leaks &#038; breaches in a GDPR-compliant way"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Data leaks &amp; data breaches: These rules must be observed according to the GDPR<\/h2>\n<p>A violation of the protection of personal data is defined in the GDPR as a &#8220;breach of security leading unintentionally or unlawfully, to the destruction, loss, alteration or unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed&#8221;. This therefore includes both a data leak, where there is a possibility that third parties could access personal data stored by you, and a data breach, where unauthorized third parties have intentionally accessed data.<\/p>\n<p>In <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"597524bb-6873-417f-a998-9edcd23f8e29\">Article 33 (1)<\/span> of the GDPR, the legislator specifies what must be done in these cases. It states that a violation of the protection of personal data must be reported to the local supervisory authority without delay, which means that you must comply with a deadline of 72 hours. In addition, all cases must be logged internally. Which authority you need to contact varies from country to country. In Germany, there is one competent supervisory authority per federal state.<\/p>\n<p>Additionally, if there is a &#8220;high risk to personal rights and freedoms&#8221; as a result of the violation, all affected individuals must be notified without exception. This high risk arises from data leaks or breaches of financial or medical data, which can be credit card or bank account data, for example.<br \/>\nHowever,<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"eb4cb709-17d7-4708-9112-72c27af7b6ba\"> if &#8220;only&#8221; contact information<\/span> is affected, such as names, e-mail address or address, notification is not absolutely necessary. However, it should be noted that if a large number of individuals are involved, the affected individuals must also be contacted in addition to the supervisory authority.<\/p>\n<p>The aforementioned 72-hour time limit for reporting a violation of the protection of personal data begins from the time a data controller becomes aware of the personal data violation. Therefore, if you come across a circumstance involving personal data in your company, and you are unsure whether it is a violation of the protection of personal data, you should first check the incident carefully. If you then know after the examination that this is actually the case, the time limit begins.[\/vc_column_text][vc_column_text]<\/p>\n<h3>Personal data breach or leak according to the GDPR: What must be reported<\/h3>\n<p>In this regard, the law specifies what information you must provide to the supervisory authority. According to <span id=\"660700dc-2f21-40fa-a8a2-21536f27e0c4\" class=\"annotationView-content-wrap\"><span class=\"ak-editor-annotation-blur\"><span class=\"ak-editor-annotation\">Article 33<\/span><\/span><\/span> of the GDPR, you must notify the authority of the following:<\/p>\n<ul class=\"ak-ul\" data-indent-level=\"1\">\n<li>A description of how the protection of personal data has been breached by you, the number of data subjects, the number of data sets, as well as the category of the violation of the protection of personal data<\/li>\n<li>The contact details of your data protection officer or the person who is responsible for it<\/li>\n<li>A description of the possible and likely consequences of the violation<\/li>\n<li>A description of the steps you have taken against the violation<\/li>\n<\/ul>\n<p>This may require notifying the data subjects, <span id=\"902451e8-b99c-457d-ac09-19b03977d18e\" class=\"annotationView-content-wrap\"><span class=\"ak-editor-annotation\">as mentioned above.<\/span><\/span> This can be done by letter, email or<span id=\"77d1c811-4668-4b54-ad45-7935cff6ad69\" class=\"annotationView-content-wrap\"> <\/span>SMS.[\/vc_column_text][vc_column_text]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Dealing with a violation of the protection of personal data in Jira and Confluence<\/h2>\n<p>The two software products Jira and Confluence from Atlassian are enjoying great popularity <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"8514ffc5-2dce-40ce-b8a7-bc420ac2e71e\">across <\/span>Europe. With the great advantages of the software, which enable an agile workflow in project management, there are of course also risks associated with the storage of personal data. However, these risks can be eliminated in no time with a few simple tricks.<br \/>\nThe simplest solution for all data protection use cases in Jira and Confluence are the apps &#8220;<strong><a href=\"https:\/\/marketplace.atlassian.com\/search?query=Data%20Protection%20and%20Security%20Toolkit\">Data Protection and Security Toolkit for Jira\/Confluence<\/a><\/strong>&#8220;. These apps allow you to prevent<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"0207af47-b6b1-48b9-838a-b5df53fa9d2c\"> personal data breaches and leaks in advance<\/span>. If it already happens and there is a data leak or breach, you can react to it quickly and fix it.[\/vc_column_text][vc_column_text]<\/p>\n<p data-pm-slice=\"1 3 []\">In the event that personal data has already been compromised, this can be remedied by <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"ae1be4c6-2d79-406c-a16d-44b8df42da58\">the following steps:<\/span><\/p>\n<p>1. If you notice that there is a violation of the protection of personal data the app&#8217;s &#8220;Data Cleaner Module&#8221; is the first place to go. Here you can find all stored and processed personal data such as email addresses, phone numbers, social security numbers, credit card numbers, etc. through a simple JQL query.[\/vc_column_text][vc_single_image image=&#8221;6897&#8243; img_size=&#8221;full&#8221; onclick=&#8221;img_link_large&#8221;][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">2. Once you have found th<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"6f0faee0-7fb9-4440-a5a3-d432154c677e\">e affected data<\/span>, you can apply various actions to them. One of the actions is extremely useful in the case that there is a &#8220;high risk to personal rights and freedoms&#8221; for personal data <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"d248c50b-c6ac-4d6b-a9c0-8c6431ccd23b\">involved<\/span>, because then you need to notify the data subjects by letter, SMS or email. For this purpose, the app has the function: &#8220;Send notification email&#8221;<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"d82381b5-2a9a-4434-a67e-8886cc5bd14f\">. This allows you to create <\/span>an email template in the app, which you can then send to all data subjects, fulfilling your obligation to notify them.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">3. The next step is to use the app function &#8220;Permission Monitoring&#8221;. After you have found all affected information in Jira tickets and Confluence pages in the first step, you can view all permissions to access the underlying data. You can edit these in the app to avoid possible access by third parties again. You can also view the entire history of access to the data in the app, allowing you to see if anyone has accessed the data and data may have leaked out. Afterwards you can anonymize or, if necessary, delete the data.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">4. In the event of a violation of the protection of personal data, you must immediately report the data breach or leak to the local supervisory authority. We have listed the information you must provide to them in the last section. When describing the actions you <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"a56af2a6-9957-4ca0-a0e9-fbe597186168\">took, <\/span>you can mention the actions taken in steps 1 to 3.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">By following these steps, you have handled the violation of the protection of personal data in compliance with the law.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Prevent <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"f5c433f0-1592-46d1-a5bb-bfb202517aed\">data breaches<\/span> and leaks with Data Protection and Security Toolkit for Jira and Confluence<\/h2>\n<p>To prevent the violation of the protection of personal data from happening in the first place, the app has other useful features for you: data rules. With these, you can define data processing rules to ensure that you don&#8217;t miss any personal data that needs to be cleaned (or even deleted). To learn how to use these data rules in practice, watch our short product video:[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?time_continue=2&amp;v=9OjdsWxIJsM&amp;feature=emb_title&#8221;][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">With the help of this tool, you do not have to worry about plugging data leaks or breaches in Jira or Confluence, because you don\u2019t let them happen in the first place.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Personal data breaches and leaks in Jira and Confluence: a conclusion<\/h2>\n<p>Data protection in Jira and Confluence may seem inscrutable to you at first, but with the help of the right tool it can be done in no time. Thanks to our article, you now know all the steps you need to take<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"0a90f867-37c5-4b40-beac-afbbf6984d53\"> just in case of a data breach or leak <\/span>and which tool will help you in Jira and Confluence: <strong><a href=\"https:\/\/marketplace.atlassian.com\/search?query=Data%20Protection%20and%20Security%20Toolkit\">Data Protection and Security Toolkit for<span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"8c91a702-4e99-4c11-944b-edc7f874cdb7\"> Jira und Confluence<\/span><\/a><\/strong>. Because our app not only helps you when it&#8217;s already too late, but also prevents data leaks and breaches in advance. This makes your company&#8217;s work on data protection much easier and lets your data protection officers sleep <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"5aff9f78-5621-46ba-859b-529abf4b883b\">in peace again.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p data-pm-slice=\"1 1 []\">Interested in how <strong><a href=\"https:\/\/marketplace.atlassian.com\/search?query=Data%20Protection%20and%20Security%20Toolkit\">Data Protection and Security Toolkit for Jira and Confluence<\/a><\/strong> can solve your personal use case? <span class=\"fabric-editor-annotation\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"e421b89d-ecb8-41e6-9785-65f710d3ce66\">Simply test our app<\/span> for free for 30 days and find out for yourself in practice! Through the link below, you can view and test <strong>Data Protection and Security Toolkit for Jira <\/strong>and <strong>Data Protection and Security Toolkit for Confluence<\/strong> on the Atlassian Marketplace:<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][button title=&#8221;Data Protection for Jira&#8221; link=&#8221;https:\/\/marketplace.atlassian.com\/apps\/1218962\/gdpr-dsgvo-and-security-for-jira?tab=overview&amp;hosting=cloud&#8221; button_align=&#8221;center&#8221; button_size=&#8221;btn-lg&#8221; el_id=&#8221;1646311533647-872588be-56e8&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][button title=&#8221;Data Protection for Confluence&#8221; link=&#8221;https:\/\/marketplace.atlassian.com\/apps\/1219041\/gdpr-dsgvo-and-security-for-confluence?hosting=cloud&amp;tab=overview&#8221; button_align=&#8221;center&#8221; button_size=&#8221;btn-lg&#8221; el_id=&#8221;1646311569511-c1c0334f-ef91&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;64 px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In order to prepare you for a data breach or leak in Jira or Confluence, we show you in this article a simple and relaxed way to deal with such cases. Furthermore, we will show you how to prevent these data violations.<\/p>\n","protected":false},"author":13,"featured_media":6901,"comment_status":"open","ping_status":"open","sticky":false,"template":"single_cta.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[238],"tags":[281,345,344,327,322,280],"class_list":["post-6899","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-data-security","tag-confluence-en","tag-data-protection-and-security-confluence-en","tag-data-protection-and-security-jira-en","tag-data-security-en","tag-gdpr-en","tag-jira-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks &amp; breaches in a GDPR-compliant way - Actonic \u2013 Unfolding your potential<\/title>\n<meta name=\"description\" content=\"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks &amp; breaches in a GDPR-compliant way\" \/>\n<meta property=\"og:description\" content=\"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/\" \/>\n<meta property=\"og:site_name\" content=\"Actonic \u2013 Unfolding your potential\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T12:39:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-31T08:56:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ruben J\u00e4ckle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruben J\u00e4ckle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/\"},\"author\":{\"name\":\"Ruben J\u00e4ckle\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/9f48b279e4bd61a4afc30082e6eac274\"},\"headline\":\"Violation of the protection of personal data in Jira or Confluence &#8211; How to deal with data leaks &#038; breaches in a GDPR-compliant way\",\"datePublished\":\"2022-03-03T12:39:36+00:00\",\"dateModified\":\"2023-03-31T08:56:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/\"},\"wordCount\":1461,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg\",\"keywords\":[\"Confluence\",\"Data Protection and Security Toolkit for Confluence\",\"Data Protection and Security Toolkit for Jira\",\"Data Security\",\"GDPR\",\"Jira\"],\"articleSection\":[\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/\",\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/\",\"name\":\"Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks & breaches in a GDPR-compliant way - Actonic \u2013 Unfolding your potential\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg\",\"datePublished\":\"2022-03-03T12:39:36+00:00\",\"dateModified\":\"2023-03-31T08:56:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/9f48b279e4bd61a4afc30082e6eac274\"},\"description\":\"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg\",\"contentUrl\":\"https:\\\/\\\/actonic.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg\",\"width\":1200,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/actonic.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Violation of the protection of personal data in Jira or Confluence &#8211; How to deal with data leaks &#038; breaches in a GDPR-compliant way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/\",\"name\":\"Actonic \u2013 Unfolding your potential\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/actonic.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/actonic.de\\\/en\\\/#\\\/schema\\\/person\\\/9f48b279e4bd61a4afc30082e6eac274\",\"name\":\"Ruben J\u00e4ckle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g\",\"caption\":\"Ruben J\u00e4ckle\"},\"url\":\"https:\\\/\\\/actonic.de\\\/en\\\/author\\\/ruben-jaeckle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks & breaches in a GDPR-compliant way - Actonic \u2013 Unfolding your potential","description":"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/","og_locale":"en_US","og_type":"article","og_title":"Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks & breaches in a GDPR-compliant way","og_description":"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!","og_url":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/","og_site_name":"Actonic \u2013 Unfolding your potential","article_published_time":"2022-03-03T12:39:36+00:00","article_modified_time":"2023-03-31T08:56:18+00:00","og_image":[{"width":1200,"height":585,"url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","type":"image\/jpeg"}],"author":"Ruben J\u00e4ckle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruben J\u00e4ckle","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#article","isPartOf":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/"},"author":{"name":"Ruben J\u00e4ckle","@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/9f48b279e4bd61a4afc30082e6eac274"},"headline":"Violation of the protection of personal data in Jira or Confluence &#8211; How to deal with data leaks &#038; breaches in a GDPR-compliant way","datePublished":"2022-03-03T12:39:36+00:00","dateModified":"2023-03-31T08:56:18+00:00","mainEntityOfPage":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/"},"wordCount":1461,"commentCount":0,"image":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#primaryimage"},"thumbnailUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","keywords":["Confluence","Data Protection and Security Toolkit for Confluence","Data Protection and Security Toolkit for Jira","Data Security","GDPR","Jira"],"articleSection":["Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/","url":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/","name":"Violation of the protection of personal data in Jira or Confluence - How to deal with data leaks & breaches in a GDPR-compliant way - Actonic \u2013 Unfolding your potential","isPartOf":{"@id":"https:\/\/actonic.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#primaryimage"},"image":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#primaryimage"},"thumbnailUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","datePublished":"2022-03-03T12:39:36+00:00","dateModified":"2023-03-31T08:56:18+00:00","author":{"@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/9f48b279e4bd61a4afc30082e6eac274"},"description":"Protect personal data in Jira and Confluence - Data Protection and Security Toolkit - Read now!","breadcrumb":{"@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#primaryimage","url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","contentUrl":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","width":1200,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/actonic.de\/en\/violation-of-the-protection-of-personal-data-in-jira-or-confluence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/actonic.de\/en\/"},{"@type":"ListItem","position":2,"name":"Violation of the protection of personal data in Jira or Confluence &#8211; How to deal with data leaks &#038; breaches in a GDPR-compliant way"}]},{"@type":"WebSite","@id":"https:\/\/actonic.de\/en\/#website","url":"https:\/\/actonic.de\/en\/","name":"Actonic \u2013 Unfolding your potential","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/actonic.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/actonic.de\/en\/#\/schema\/person\/9f48b279e4bd61a4afc30082e6eac274","name":"Ruben J\u00e4ckle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1bd9fb07640504f06d705ac17460c2bef4f5a126dbffdb477e32751261219421?s=96&d=mm&r=g","caption":"Ruben J\u00e4ckle"},"url":"https:\/\/actonic.de\/en\/author\/ruben-jaeckle\/"}]}},"jetpack_featured_media_url":"https:\/\/actonic.de\/wp-content\/uploads\/2022\/03\/Personal-data-breach-in-Jira-or-Confluence-EN-v2.jpg","_links":{"self":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts\/6899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/comments?post=6899"}],"version-history":[{"count":0,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/posts\/6899\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/media\/6901"}],"wp:attachment":[{"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/media?parent=6899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/categories?post=6899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/actonic.de\/en\/wp-json\/wp\/v2\/tags?post=6899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}