{"id":48750,"date":"2021-03-03T19:19:48","date_gmt":"2021-03-03T19:19:48","guid":{"rendered":"https:\/\/www.jamasoftware.com\/?page_id=48750"},"modified":"2025-12-02T10:20:33","modified_gmt":"2025-12-02T18:20:33","slug":"trust","status":"publish","type":"page","link":"https:\/\/www.jamasoftware.com\/trust\/","title":{"rendered":"Privacy and Security"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-n8y1vj-d1001fc7f9a4f30e2b0d8d0e3fad049f\">\n.avia-section.av-n8y1vj-d1001fc7f9a4f30e2b0d8d0e3fad049f{\nbackground-color:#05003b;\nbackground:linear-gradient( to right, #05003b, #1863d1 );\n}\n.avia-section.av-n8y1vj-d1001fc7f9a4f30e2b0d8d0e3fad049f .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#2c538d;\n}\n<\/style>\n<div id='heading'  class='avia-section av-n8y1vj-d1001fc7f9a4f30e2b0d8d0e3fad049f main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-bg-style-scroll av-section-color-overlay-active container_wrap sidebar_right'  ><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48750'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-n46l9u-bb63d8adbb02f9674882fd0a6e783bc4 sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-n46l9u-bb63d8adbb02f9674882fd0a6e783bc4\">\n.flex_column.av-n46l9u-bb63d8adbb02f9674882fd0a6e783bc4{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-n46l9u-bb63d8adbb02f9674882fd0a6e783bc4 av_one_half  avia-builder-el-1  avia-builder-el-no-sibling  first no_margin flex_column_table_cell av-equal-height-column av-align-bottom av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klttouc8-496d3671dda0bdb0e7d2555afd38c03d\">\n#top .av-special-heading.av-klttouc8-496d3671dda0bdb0e7d2555afd38c03d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-klttouc8-496d3671dda0bdb0e7d2555afd38c03d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-klttouc8-496d3671dda0bdb0e7d2555afd38c03d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-klttouc8-496d3671dda0bdb0e7d2555afd38c03d av-special-heading-h1 meta-heading blockquote modern-quote  avia-builder-el-2  avia-builder-el-no-sibling '><h1 class='av-special-heading-tag '  >Privacy and Security<\/h1><div class='av-subheading av-subheading_below'><p>At Jama Software\u00ae, security is not an afterthought.<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-718ghla-61a402cb2bc4b5fe914b2f3d8ecec1f4 main_color avia-section-default avia-no-border-styling  avia-builder-el-3  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48750'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-klss1v7u-cdbb87f292e5c0e438afa0fd53181448 '  ><div class='avia_textblock' ><h3>We Take Security Seriously<\/h3>\n<p><strong>We understand how important data security is to you and your customers, and we work hard to ensure that data security and privacy are top considerations in all of our business operations.<\/strong><\/p>\n<p>Protecting our customers\u2019 data is our highest priority. We code with Open Web Application Security Project (OWASP) best practices, host in a secure AWS cloud, perform daily static and dynamic scans, regular PEN tests (third-party), and are SOC 2 Type 2 certified.<\/p>\n<p>Jama Software<sup>\u00ae<\/sup> is the only vendor in the requirements management and traceability space that is SOC 2 Type 2 compliant both on the application layer and the data center offerings. Additionally, Jama Connect<sup>\u00ae<\/sup> is the only requirements management solution that is deployed via multi-tenant cloud.<\/p>\n<\/div><\/section>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_3'  class='avia-section av-9jw0226-2529f3ba5955d9cfd76c501157e34d97 main_color avia-section-default avia-no-border-styling  avia-builder-el-5  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48750'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-miowbpct-2831bc76533ac08d31f1748df579c238 av_four_fifth  avia-builder-el-6  el_before_av_one_third  avia-builder-el-first  center-column first flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4\">\n#top .av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4{\npadding-bottom:10px;\nfont-size:28px;\n}\nbody .av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 .av-special-heading-tag{\nfont-size:28px;\n}\n.av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 .av-subheading{\nfont-size:18px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-miow5mst-fc7e45784ebd8d9b3f815637b74371a4 av-special-heading-h3 blockquote modern-quote modern-centered  avia-builder-el-7  avia-builder-el-no-sibling  av-inherit-size'><h3 class='av-special-heading-tag '  >Enterprise-Grade <span style=\"color: #fc9d2f;\">Security and Reliability<\/span> You Can Count On to Keep Your Data Protected and Compliant<\/h3><div class='av-subheading av-subheading_below'><p>Jama Connect\u00ae is the only requirements management platform with enterprise-grade security across every layer. Unlike other vendors, Jama Software provides a <strong style=\"color: #211f38;\">SOC 2 Type II<\/strong> certified application and data center, plus <strong style=\"color: #211f38;\">touchless upgrades and built-in disaster recovery<\/strong>\u2014reducing risk, ensuring compliance, and keeping your requirements secure and accessible.<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div><div class='flex_column_table av-8xvhyq6-5b6d507971a43e95012df605d9f5be96 sc-av_one_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8xvhyq6-5b6d507971a43e95012df605d9f5be96\">\n.flex_column.av-8xvhyq6-5b6d507971a43e95012df605d9f5be96{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-8xvhyq6-5b6d507971a43e95012df605d9f5be96 av_one_third  avia-builder-el-8  el_after_av_four_fifth  el_before_av_one_third  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8elajda-6b2b869f1b3de844df74a120dd142b82\">\n.avia-image-container.av-8elajda-6b2b869f1b3de844df74a120dd142b82 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-8elajda-6b2b869f1b3de844df74a120dd142b82 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-8elajda-6b2b869f1b3de844df74a120dd142b82 av-styling- avia-align-center  avia-builder-el-9  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84884 avia-img-lazy-loading-not-84884 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/TUV-SUD-Security-1-80x80.png\" alt='TUV SUD logo' title=''  height=\"80\" width=\"80\" srcset=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/TUV-SUD-Security-1-80x80.png 80w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TUV-SUD-Security-1-300x300.png 300w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TUV-SUD-Security-1-150x150.png 150w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TUV-SUD-Security-1.png 1000w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-7vigvwu-f8078f8766e3bfcc09b38feb76800690 '  ><div class='avia_textblock' ><p style=\"text-align: center;\">Jama Connect is suitably validated by T\u00dcV S\u00dcD for safety-related development<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7h496z2-109c9bc4fe0b42fee8e7572a8f5c4f3d\">\n.flex_column.av-7h496z2-109c9bc4fe0b42fee8e7572a8f5c4f3d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-7h496z2-109c9bc4fe0b42fee8e7572a8f5c4f3d av_one_third  avia-builder-el-11  el_after_av_one_third  el_before_av_one_third  no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7800x66-4f1eda637c524c68d57fd33c493e6833\">\n.avia-image-container.av-7800x66-4f1eda637c524c68d57fd33c493e6833 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-7800x66-4f1eda637c524c68d57fd33c493e6833 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-7800x66-4f1eda637c524c68d57fd33c493e6833 av-styling- avia-align-center  avia-builder-el-12  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84906 avia-img-lazy-loading-not-84906 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/12\/logo-tisax.png\" alt='' title=''  height=\"80\" width=\"220\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-6juwca6-4e3cd60fee99e891d7dbcf5897f90010 '  ><div class='avia_textblock' ><p style=\"text-align: center;\">Jama Connect is TISAX Level 2 certified, ensuring secure automotive industry compliance<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6egmlla-26cf641bf9c2cf9913cdc83216d6a65a\">\n.flex_column.av-6egmlla-26cf641bf9c2cf9913cdc83216d6a65a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6egmlla-26cf641bf9c2cf9913cdc83216d6a65a av_one_third  avia-builder-el-14  el_after_av_one_third  el_before_av_one_third  no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5w0jpfy-58bcfcb4ecb362964101fa4929d72abe\">\n.avia-image-container.av-5w0jpfy-58bcfcb4ecb362964101fa4929d72abe img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-5w0jpfy-58bcfcb4ecb362964101fa4929d72abe .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-5w0jpfy-58bcfcb4ecb362964101fa4929d72abe av-styling- avia-align-center  avia-builder-el-15  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84907 avia-img-lazy-loading-not-84907 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/12\/owasp-new-logo-1.png\" alt='owasp logo' title=''  height=\"80\" width=\"231\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-548dmb2-49f6ab29bfad84cbee3e2d1481209254 '  ><div class='avia_textblock' ><p style=\"text-align: center;\">Jama Software codes with OWASP best practices<\/p>\n<\/div><\/section><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div class='flex_column_table av-miovvtxc-58f7b26d4023843fbca351530c699bb1 sc-av_one_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-miovvtxc-58f7b26d4023843fbca351530c699bb1\">\n.flex_column.av-miovvtxc-58f7b26d4023843fbca351530c699bb1{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-miovvtxc-58f7b26d4023843fbca351530c699bb1 av_one_third  avia-builder-el-17  el_after_av_one_third  el_before_av_one_third  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4tuloq6-1a022dc2d9b607da4672c68989bb1c78\">\n.avia-image-container.av-4tuloq6-1a022dc2d9b607da4672c68989bb1c78 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-4tuloq6-1a022dc2d9b607da4672c68989bb1c78 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-4tuloq6-1a022dc2d9b607da4672c68989bb1c78 av-styling- avia-align-center  avia-builder-el-18  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84881 avia-img-lazy-loading-not-84881 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/Badge-SOC2TypeII-80x80.webp\" alt='SOC 2 Type II logo' title=''  height=\"80\" width=\"80\" srcset=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/Badge-SOC2TypeII-80x80.webp 80w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Badge-SOC2TypeII-300x300.webp 300w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Badge-SOC2TypeII-150x150.webp 150w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Badge-SOC2TypeII.webp 350w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-49659wu-c96ce64b06ededbfa6ab694590ce7c42 '  ><div class='avia_textblock' ><p style=\"text-align: center;\">Jama Connect is SOC2 Type 2 certified in both the server and application<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3rkjrxq-13751032bd1027553da8223a7cdc2d9c\">\n.flex_column.av-3rkjrxq-13751032bd1027553da8223a7cdc2d9c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3rkjrxq-13751032bd1027553da8223a7cdc2d9c av_one_third  avia-builder-el-20  el_after_av_one_third  el_before_av_one_third  no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3dbzp8u-4988e559fa1470ad4ccb9043e838e478\">\n.avia-image-container.av-3dbzp8u-4988e559fa1470ad4ccb9043e838e478 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-3dbzp8u-4988e559fa1470ad4ccb9043e838e478 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-3dbzp8u-4988e559fa1470ad4ccb9043e838e478 av-styling- avia-align-center  avia-builder-el-21  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84880 avia-img-lazy-loading-not-84880 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/Security-Lock-1-1-80x80.png\" alt='Security Lock' title=''  height=\"80\" width=\"80\" srcset=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/Security-Lock-1-1-80x80.png 80w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Security-Lock-1-1-300x300.png 300w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Security-Lock-1-1-150x150.png 150w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/Security-Lock-1-1.png 1000w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-32bakvi-53f26f417b4c0ed01f33a4e93f0feb1b '  ><div class='avia_textblock' ><p class=\"p1\" style=\"text-align: center;\">Jama Software ensures strong privacy management practices<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2eggsr2-e228822ac613007e1aa3916d828df049\">\n.flex_column.av-2eggsr2-e228822ac613007e1aa3916d828df049{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2eggsr2-e228822ac613007e1aa3916d828df049 av_one_third  avia-builder-el-23  el_after_av_one_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-26murm6-8d248f332e92b2f757c96ff39c117aa5\">\n.avia-image-container.av-26murm6-8d248f332e92b2f757c96ff39c117aa5 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-26murm6-8d248f332e92b2f757c96ff39c117aa5 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-26murm6-8d248f332e92b2f757c96ff39c117aa5 av-styling- avia-align-center  avia-builder-el-24  el_before_av_textblock  avia-builder-el-first '  ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-84885 avia-img-lazy-loading-not-84885 avia_image ' src=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/TLS-1-80x80.png\" alt='' title=''  height=\"80\" width=\"80\" srcset=\"https:\/\/www.jamasoftware.com\/media\/2025\/11\/TLS-1-80x80.png 80w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TLS-1-300x300.png 300w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TLS-1-150x150.png 150w, https:\/\/www.jamasoftware.com\/media\/2025\/11\/TLS-1.png 1000w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-1mlwz72-7863f0c155560a484f12e25e3a622fc3 '  ><div class='avia_textblock' ><p style=\"text-align: center;\">Transport Layer Security (TLS) ensures data transferred is secured and encrypted in Jama Connect<\/p>\n<\/div><\/section><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_4'  class='avia-section av-192yjim-98274f706459fce4b619a31df4965169 main_color avia-section-default avia-no-border-styling  avia-builder-el-26  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48750'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-pcz4mm-5af1a724a937df836211c847f64dd19e '  ><div class='avia_textblock' ><p><strong>Here are some of the ways we protect your IP:<\/strong><\/p>\n<h4>AWS Cloud Platform<\/h4>\n<p>One of the core reasons we use Amazon\u2019s AWS EC2 platform is the wealth of security experience Amazon has amassed over the years in building and growing AWS. Amazon\u2019s AWS EC2 Platform is the gold standard not only for cloud applications, but also for application and data security. Amazon has successfully completed many security audits and is certified for some of the strictest and most thorough standards.<\/p>\n<p>Don\u2019t take our word for it though. Amazon provides <a href=\"http:\/\/aws.amazon.com\/compliance\/\" target=\"_blank\" rel=\"noopener\">resources<\/a> to expand on its certifications and third-party audits. For details on AWS certifications and accreditation, please visit <a href=\"http:\/\/aws.amazon.com\/security\" target=\"_blank\" rel=\"noopener\">aws.amazon.com\/security<\/a>.<\/p>\n<h4>Data Protection<\/h4>\n<h6>TLS<\/h6>\n<p>In addition to constantly monitoring our web application security, we utilize TLS certificates for all our web transactions, meaning that all data transferred between our clients and our application are secured and encrypted.<\/p>\n<h6>Data Isolation<\/h6>\n<p>In Jama Connect\u2019s multi-tenant environments, customer data resides in a unique, separate database. In addition, stored passwords are encrypted. You may designate a physical location to store your users\u2019 personal data. Jama Software offers hosted services in North America and Europe.<\/p>\n<h6>Data Access<\/h6>\n<p>Only a select group of Jama Software employees has access to our production environments and only after undergoing thorough background checks. Each is contractually bound to maintain customer confidentiality and trained on the intricacies of handling sensitive data. Additionally, we further secure these environments by providing individual credentials for each of our admins and conducting regular audits of our access logs to proactively detect any misconduct.<\/p>\n<p>Jama Software will provide customers with a copy of their data upon request, as well as delete and restore data (including backups). Jama Connect stores all updates for audit purposes.<\/p>\n<h6>Standards<\/h6>\n<p>Jama Software&#8217;s security policy is based on NIST Standards which cover requirements and details associated with security topics including policy, network management, risk management, compliance, access control, network management, and more. For details on NIST visit: <a title=\"Original URL: https:\/\/www.nist.gov\/. Click or tap if you trust this link.\" href=\"https:\/\/nam02.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.nist.gov%2F&amp;data=05%7C01%7Cksundbom%40jamasoftware.com%7C1495bba5f6f84318e48308db990788b7%7Cd2ed76b1592b4d31881376c23294e0c4%7C0%7C0%7C638272029849061321%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=5HAQ1N3mRtQzJx14clIb4GtD%2FURB2lQN2Z6BVuUcZTE%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"0\">National Institute of Standards and Technology (nist.gov)<\/a><\/p>\n<h4>Information Usage<\/h4>\n<h6>The Jama Software Website<\/h6>\n<p>Jama Software collects site visitor information to guide website optimization and opt-in marketing best practices. Should you provide information and opt into marketing, you will receive periodic emails from Jama Software. Those who opt-in might also receive additional announcements from us about product updates, services, or the company newsletter. You may opt-out at any time.<\/p>\n<h6>Product Usage Data<\/h6>\n<p>Our product team is committed and dedicated to providing the absolute best Jama experience. To support this initiative, we might ask to access your anonymized usage data. This is optional and completely opt-in. Analysis of this data will inform our data-driven product development. Please see the <a href=\"\/privacy\/usage-data\/\">Usage Data FAQ<\/a> for more information.<\/p>\n<h6>Privacy and GDPR<\/h6>\n<p>Jama Software is committed to ensuring the privacy of our customers\u2019 personal information and our customer data. For more information, visit our privacy page at <a href=\"https:\/\/www.jamasoftware.com\/privacy\" target=\"_blank\" rel=\"noopener\">https:\/\/www.jamasoftware.com\/privacy<\/a>. Jama Software enters into DPAs and Standard Contractual Clauses with our customers and suppliers as appropriate.<\/p>\n<h6>Questions?<\/h6>\n<p>Contact the <a href=\"http:\/\/support.jamasoftware.com\/home\">Jama Software Support Team<\/a>.<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_4'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48750'><div class='entry-content-wrapper clearfix'><\/p>\n<input class=\"fooboxshare_post_id\" type=\"hidden\" value=\"48750\"\/>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":53,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-48750","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Jama Privacy and Security | Jama Software<\/title>\n<meta name=\"description\" content=\"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jamasoftware.com\/trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy and Security\" \/>\n<meta property=\"og:description\" content=\"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jamasoftware.com\/trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Jama Software\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T18:20:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jamasoftware.com\/trust\/\",\"url\":\"https:\/\/www.jamasoftware.com\/trust\/\",\"name\":\"Jama Privacy and Security | Jama Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.jamasoftware.com\/#website\"},\"datePublished\":\"2021-03-03T19:19:48+00:00\",\"dateModified\":\"2025-12-02T18:20:33+00:00\",\"description\":\"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.jamasoftware.com\/trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jamasoftware.com\/trust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jamasoftware.com\/trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jamasoftware.com\/solutions\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jamasoftware.com\/#website\",\"url\":\"https:\/\/www.jamasoftware.com\/\",\"name\":\"Jama Software\",\"description\":\"Jama Connect\u00ae #1 in Requirements Management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jamasoftware.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Jama Privacy and Security | Jama Software","description":"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jamasoftware.com\/trust\/","og_locale":"en_US","og_type":"article","og_title":"Privacy and Security","og_description":"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.","og_url":"https:\/\/www.jamasoftware.com\/trust\/","og_site_name":"Jama Software","article_modified_time":"2025-12-02T18:20:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.jamasoftware.com\/trust\/","url":"https:\/\/www.jamasoftware.com\/trust\/","name":"Jama Privacy and Security | Jama Software","isPartOf":{"@id":"https:\/\/www.jamasoftware.com\/#website"},"datePublished":"2021-03-03T19:19:48+00:00","dateModified":"2025-12-02T18:20:33+00:00","description":"We know how important data security is to you and your customers. Learn how we keep your your IP safe through our privacy and security policies.","breadcrumb":{"@id":"https:\/\/www.jamasoftware.com\/trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jamasoftware.com\/trust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.jamasoftware.com\/trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jamasoftware.com\/solutions\/home\/"},{"@type":"ListItem","position":2,"name":"Privacy and Security"}]},{"@type":"WebSite","@id":"https:\/\/www.jamasoftware.com\/#website","url":"https:\/\/www.jamasoftware.com\/","name":"Jama Software","description":"Jama Connect\u00ae #1 in Requirements Management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jamasoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/pages\/48750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/comments?post=48750"}],"version-history":[{"count":0,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/pages\/48750\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/media?parent=48750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}