Jifflenow Security Policy
Access Management
The Jifflenow CSM/Administrator user who sets up the initial configuration for the application are authorized by our SSO mechanism. All activities are logged and auditable.
There are different types of roles a user can be assigned within the Jifflenow platform. Users can self-register or be added and assigned roles through the Administrator of the Company. Users self-registering through the application are assigned the default role of “User” which has the lowest privilege levels in the application. These users are typically people from Sales team who initiate meeting request in the application. User roles beyond “User” (for example, Executive, Executive Admin) can only be added by the Administrator of the application or by changing an existing user’s role.
The system sends a verification email to the email address provided by the user or added by the administrator. This email contains a one-time valid URL that the user has to click. This link will show the user a page to set up his password credentials.
There is a password policy. Passwords have to be minimum of 8 characters length. It should contain at least one capital letter, one small letter and one number or special character.
We support SAML ( both IdP and SP initiated) and OAuth2 (Goo gle Apps.) for SSO.
Passwords are hashed and stored. They are hashed using bcrypt hashing algorithm with a unique password salt.
Data Protection
We minimally collect user information for identification, communication, processing and reporting for intended purpose of the system. We collect the following information:
Mandatory:
- First Name
- Last Name
- Email Address
Optional:
- Business Phone
- Job Title
- Profile Pic
Yes, we regularly conduct penetration testing of the application with the help of Veracode. We can provide the last penetration test result of the application upon request.
We preserve the access and action logs up-to 30 days. We preserve the access and action logs up-to 30 days. All Customer Data will be removed from the Jifflenow Services within 90 days after termination of the contract.
The databases are managed by Amazon Relational Database Service (Amazon RDS). The database are automatically backed up with daily full backups. The database backup is encrypted. Encryption keys are managed by the AWS Key Management Service (Amazon KMS).
Yes, user passwords expire and has to be reset every 90 days. This does not apply if the customer uses SSO Integration.
Jifflenow has a Staging Environment which has the same platform setup and running for customers to try out features and test integrations. Staging Environment is hosted outside Production environment and the data is not shared between the same environments.
No. Production data never moves out of our Production environment.
Secure Development Process
Jiffle development understands the importance of application security and the information security. The application is developed generic and any data processed is at runtime to the specific company’s environment. Only the Infrastructure team has access to the production infrastructure.
Yes, every requirement and enhancement is analyzed from a security perspective and we ensure the need is met with security in mind.
We follow the security guidelines of OWASP 10. The underlying application framework used is Rails which implements this guidelines.
Infrastructure & Security
Yes, we assess the Infrastructure using OpenVAS every month or whenever there are major changes done to the infrastructure. We can provide the recent penetration test result of the infrastructure upon request.
Yes, we assess the Infrastructure using OpenVAS every month or whenever there are major changes done to the infrastructure. We can provide the recent penetration test result of the infrastructure upon request.
Our infrastructure runs within Amazon Virtual Private Cloud (Amazon VPC). A lot of network security features are available for Amazon VPC. We utilize Security Groups as Stateful firewall along with host level firewalls. We have active monitoring of the Production Instances and External monitoring of the availability of applications. We also have audit logs that help us to take proactive and reactive steps.
Our infrastructure runs within Amazon Virtual Private Cloud (Amazon VPC). A lot of network security features are available for Amazon VPC. We utilize Security Groups as Stateful firewall along with host level firewalls. We have active monitoring of the Production Instances and External monitoring of the availability of applications. We also have audit logs that help us to take proactive and reactive steps.
Our Infrastructure is managed by Amazon Web Services (AWS). The primary data center is in us-east region. The secondary (DR) data center is in us-west. Our datacenter partner has been certified for ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, SOC 3. They are committed to be EU GDPR requirements.
We subscribe/watch for security updates. Together apply it on our testing/staging environments, verify it doesn’t affect the application, then apply the patch on the production environment. All the machines are patched with up-to-date patches every 4 weeks. Very High Impact patches are applied within 48 hours.
Yes all the communication between the user’s browser to the server is encrypted over TLS.
TLS 1.1 and TLS 1.2 with modern ciphers suite recommended by Mozilla TLS Observatory.
Yes. Data at rest is secured. AWS provides data-at-rest options and key management to support the encryption process. Encryption keys are managed by the AWS Key Management Service (Amazon KMS).
Yes we have ClamAV installed on our environments, that scans daily for any commonly susceptible to virus and malware attacks. The antivirus database is updated daily.
At Jifflenow we take a lot of proactive measures to prevent any sort of security incidents. All our customers have a dedicated account manager and customer service manager. The customer is notified within 48 hours after we are aware of the incident.
Jifflenow is EU-GDPR Compliant. Jifflenow is EU-US Privacy Shield approved.
Jifflenow Sub-processor List
Jifflenow engages with below set of subprocessors to provide our services, after ensuring that these vendors are compliant and sign the Data Protection Agreement. Below list details the name of the subprocessor, location of data processing and the purpose.
Vendor Name
Purpose
Location
Amazon Web Services (AWS)
Hosting Provider
USA
Sendgrid
Email Relay Service
USA
Sumologic
Centralized log management system
USA
Pendo
User guide, feature usage analysis
Zendesk
Customer Support Tickets management
USA
Hubspot
Marketing Automation
USA
Jiffle Technologies Private Limited, A wholly owned subsidiary of Ipolipo Inc., d/b/a Jifflenow USA.
Development and maintenance of Jifflenow application, Customer Support, Infrastructure Administration
India
Objecting to a Sub-processor
After reviewing information related to a particular sub-processor obtained through the above link, an objection to a sub-processor can be made by downloading and completing the Objection Request Document found at this link and submitting it to privacy@jifflenow.com with the subject line “Sub-processor Objection”.