Security Policy

Last updated: January 31, 2025

1. Introduction

JetHeads is committed to ensuring the security and integrity of its Forge-based SaaS offerings. This Security Policy outlines the measures, practices, and guidelines implemented to safeguard the security of our applications and promotional website.

2. Information Security Management

2.1 Scope

This policy covers all aspects of security, including Forge applications, promotional website operations, and related systems managed by JetHeads.

2.2 Compliance

JetHeads adheres to industry best practices and ensures compliance with Atlassian security requirements. Our security measures are designed to protect against unauthorized access, vulnerabilities, and cyber threats.

3. Forge Application Security

3.1 Data Handling

JetHeads’ Forge applications run entirely within Atlassian’s cloud infrastructure and do not access, store, or process any customer data. All data remains within Atlassian’s secure environment, and JetHeads has no access to user data.

3.2 Authentication and Authorization

All authentication and authorization mechanisms are managed by Atlassian. JetHeads does not handle user credentials, sign-ups, or logins.

3.3 Security Updates and Patching

JetHeads follows Atlassian’s security guidelines and deploys updates in compliance with Forge security best practices. Any vulnerabilities identified in Forge applications are addressed promptly.

4. Promotional Website Security

4.1 Data Collection

The JetHeads promotional website does not collect personal user data. However, it utilizes analytics, marketing, and remarketing tools to optimize the user experience. Data collection is limited to non-personal usage information.

4.2 Third-Party Services

JetHeads may use third-party service providers for analytics and marketing purposes. These providers operate under their respective privacy policies, and JetHeads ensures compliance with applicable data protection regulations.

5. Access Control

5.1 Internal Access Restrictions

Access to JetHeads’ internal systems is limited to authorized personnel based on the principle of least privilege. Multi-factor authentication (MFA) is enforced where applicable.

5.2 Account Management

JetHeads maintains strict controls over internal user accounts. Access reviews are conducted periodically to ensure that only necessary personnel have permissions.

6. Incident Response and Management

6.1 Incident Reporting

Employees and partners are trained to recognize and report security incidents. JetHeads has an incident response process to promptly investigate and mitigate security threats.

6.2 Communication

In the event of a security incident related to our promotional website, JetHeads will notify affected parties as required by applicable laws and regulations.

7. Security Awareness Training

All JetHeads employees undergo regular security training to stay informed about cybersecurity risks, secure development practices, and compliance requirements.

8. Continuous Improvement

JetHeads regularly reviews and updates its security policies and practices to address evolving threats and align with industry standards.

9. Conclusion

This Security Policy reflects JetHeads’ commitment to maintaining a high standard of security. Employees, contractors, and partners are expected to comply with this policy to ensure the ongoing security and integrity of JetHeads’ applications and website.