Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Last Updated: February 15 December 20, 2023
This document will be updated when our Security Practices are changed to reflect any new practices adopted.

55 Degrees knows security is critical yet hard to perfect. Thus, we are always improving our practices. Please read through our security practices and contact us via our Support Portal at https://support.55degrees.se if you have any questionsvisit the trust page on our website and, if needed, visit our external trust center where you can download compliance certificates and audit reports as well as learn more about process and policies.

Our Security Practices should be read in conjunction with the 55 Degrees Privacy Statement and Policies and your Customer Agreement: Cloud Products | On-Prem Products.

...

Please contact us via our Support Portal at https://support.55degrees.se if you have any questions.

...

We're ISO 27001 Certified

...

and SOC 2 Type II compliant

You can visit our compliance page to read more and download find out how to access our certificate and audit reports.

Visit our compliance page

...

Our embedded Cloud products

We offer many apps as embedded apps within the Atlassian Jira and Azure DevOps Cloud platforms. When we can, we store all your data on the host Cloud instance. In some cases, this might not be possible due to the size of the data asset, the security sensitivity of the data, and the general limitations of what's capable with the available APIs. When your data is stored on the host Cloud instance, the app needs to be installed on your instance in order for us to retrieve it. In the cases where data needs to be stored on our database, we'll use the appropriate security techniques, such as using encryption and general checksum hashing for data.

...

...

Our On-Premise products

Our on-premise products are completely hosted on your hardware. These products do not need to reach out via the internet. We access, process, or store zero data outside of your hardware. We don't even employ usage analytics! In this case, you are fully in charge of your own security. Note that we do have a DPA for our on-prem customers, but the data transfers mentioned are entirely focused on ancillary platforms such as our support portal.

...

11.3. Our supplier and sub-processor page states, as clearly as possible, which vendors are used for which products and via which user interactions.

...

For a most up-to-date view of our technical measures and monitored controls, visit https://trust.55degrees.se.

Info

Please note that this document is not a legal document nor a guarantee. It should be treated as guidance on what 55 Degrees strives to accomplish in this area.