User means any person who has registered an account on our Services by logging in via Atlassian Cloud.
Personal Information is as defined in the Privacy Act 1988 (Cth) (“Privacy Act”). The Privacy Act defines ‘Personal Information’ as “Information or an opinion about an identified individual, or an individual who is reasonably identifiable: whether the information or opinion is true or not; and whether the information or opinion is recorded in a material form or not.”
Customer Data means any content added by a User to the Services.
What information you provide to us
As a User of the Services, you provide information to us. This includes:
- profile information like your name and email address;
- content you provide through the Services, for instance activity filters and reports;
- when you subscribe to our paid services, your billing details including your address;
- details of services we have provided to you or that you have enquired about;
- your responses to questionnaires, surveys, or requests for feedback; and
- additional Personal Information that you provide to us directly or indirectly through your use of our Services, associated social media platforms or accounts from which you permit us to collect information.
What information we log about you
We log information about your access and use of our Services. This includes:
- your communications with our Services;
- your behavior through analytics events;
- your Internet Protocol (IP) address;
- your approximate geographic location;
- the storage of Internet cookies;
- the type of browser you are using;
- the type of device you are using; and
- the type of operating system you are using.
How we use information we collect
We collect and use your information:
- to enable you to access and use our Services;
- to enable you to create Activity Filters and Reports;
- to process your payments where you have signed up to a paid service;
- to contact and communicate with you;
- to improve our Services through research and development;
- to prevent and address technical problems;
- to provide you with support services if requested;
- for internal record keeping; and
- for advertising and marketing, including to send you information about our products and services.
How we share information we collect
We share information we collect about you in the ways discussed below, including in connection with possible business transfers, but we are not in the business of selling information about you to advertisers or other third parties.
Where we disclose your Personal Information to third parties for the purposes listed below, we will confirm that the third party’s privacy policies and procedures are in accordance with the Privacy Act.
Sharing with third parties
As part of providing our Services, we use third party services to store and process your Personal Information. This includes third parties that store data outside of Australia.
List of third party processors
- Location: Mountain View, United States.
- Security certifications: Privacy Shield, ISO27001, SOC3.
- Data processed: Anonymized content, Email address, IP address.
- Use: Data storage, backups, CDN, SSL, domain management.
- Location: Denver, United States.
- Security certifications: SOC2.
- Data processed: Email address, user name.
- Use: Email sending and management.
Other third party disclosure
In addition, we may disclose Personal Information to:
- credit reporting agencies and courts, tribunals and regulatory authorities where you fail to pay for goods or services provided to you;
- courts, tribunals, regulatory authorities and law enforcement officers as required by law, in connection with any actual or prospective legal proceedings, or in order to establish, exercise or defend our legal rights; and
- third parties, including agents or sub-contractors, who assist us in providing information, products, services or direct marketing to you. This may include parties located, or that store data, outside of Australia.
If there is a change of control of our business or a sale or transfer of business assets, we reserve the right to transfer our user databases, together with any Personal Information and non-Personal Information contained in those databases, to the extent permissible by law. This information may be disclosed to a potential purchaser. We would seek to only disclose information in good faith.
Your provision of third party information: If you provide us with third party Personal Information then you warrant to us that you have the third party’s consent.
Access: You may request details of Personal Information that we hold about you, in certain circumstances set out in the Privacy Act 1988 (Cth) (Privacy Act). We may refuse to provide you with information that we hold about you, in certain circumstances set out in the Privacy Act.
Correction: If you believe that any information we hold about you is inaccurate, out of date, incomplete, irrelevant or misleading, please edit your Personal Information or contact us. We rely in part upon customers advising us when their Personal Information changes. We will respond to any request within a reasonable time. We will endeavor to promptly correct any information found to be inaccurate, incomplete or out of date.
Complaints: If you wish to make a complaint, please contact us using the details below and provide us with full details of the complaint. We will promptly investigate your complaint and respond to you, in writing, setting out the outcome of our investigation and the steps we will take in response to your complaint. You also have the right to contact the relevant authority in the country in which you are based.
Unsubscribe: You may opt out of non-transactional or non-account related promotional emails by clicking the “unsubscribe” link located at the bottom of our communications.
Data storage, transfer, and security
Deffo hosts data with hosting service providers in numerous countries including the United States and Australia. We are committed to ensuring that the information you provide is secure. In order to prevent unauthorized access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information and protect it from misuse, interference, loss and unauthorized access, modification and disclosure.
Where data is transferred over the Internet, the data is encrypted by using modern cryptography (HTTPS with TLS 1.3) and secured with additional, recommended safety measures (Strict Transport Security).
Links to other websites
For any questions, please contact us.
Last revised: October 24, 2020