Your privacy is important to us. This policy explains how we collect, use, protect, and handle your personal information.
Last Updated: February 5, 2026
We collect information that you provide directly to us, including:
We collect this information when you request services, instant demos, create an account, communicate with us, or engage with our platforms.
We use the information we collect to:
We process your data lawfully, transparently, and only for legitimate business purposes.
We implement robust security measures to protect your information:
Your security is our top priority, and we apply the same rigorous standards to our own systems.
We do not sell your personal information. We may share your data only in these circumstances:
All third parties are bound by strict confidentiality agreements and data protection requirements.
When you connect SLASH to third-party services (like Slack or Jira), data is exchanged bi-directionally between SLASH and those services. Here's what happens:
How It Works:
When you enable an integration, SLASH exchanges specific data with the connected service. Both Slack and Jira integrations support bi-directional data flow — SLASH sends vulnerability data to the service, and actions taken in the service sync back to SLASH.
- What SLASH Sends to Slack: When vulnerabilities are found or pentest status changes, SLASH sends this information TO your Slack channels:
- Vulnerability titles and descriptions
- Severity levels (Critical, High, Medium, Low)
- Status changes (e.g., "New", "In Progress", "Resolved")
- Pentest progress updates
- Report publication notifications
- Comments added to vulnerabilities (from the SLASH platform)
- What Slack Sends to SLASH: When your team interacts with vulnerability notifications in Slack:
- Status changes made via interactive buttons/dropdowns update the vulnerability status in SLASH
- Comments submitted via the comment modal are added to the vulnerability in SLASH
- Thread replies to vulnerability notifications are synced as comments on the vulnerability in SLASH
- Where It Goes: Outbound data appears as messages in your configured Slack channels. Inbound actions update vulnerability statuses and comments within SLASH.
- Purpose: To enable your team to receive real-time notifications and take action on security findings directly from Slack
- You Control: You choose which events trigger notifications and which Slack channels receive them. You can disconnect anytime.
- User Verification: All actions from Slack are verified by matching the Slack user's email to a SLASH platform user within your organization. Unauthorized users cannot modify data.
- Authentication: All incoming requests from Slack are verified using Slack's request signing (HMAC-SHA256) with timestamp validation to prevent replay attacks.
- Third-Party Privacy: Data sent to Slack is subject to Slack's privacy policy (https://slack.com/privacy-policy)
- What SLASH Sends to Jira: When vulnerabilities are discovered, SLASH creates Jira issues containing:
- Vulnerability titles and descriptions
- Severity levels and CVSS scores
- Remediation steps and recommendations
- Pentest metadata (project name, dates, etc.)
- Status updates when vulnerabilities change state in SLASH
- Comments added to vulnerabilities in SLASH
- What Jira Sends to SLASH: When changes occur in Jira, SLASH receives:
- Status changes on linked Jira issues (mapped back to SLASH vulnerability statuses)
- Comments added to linked Jira issues (synced as system comments in SLASH)
- Issue deletion signals (to update sync status in SLASH)
- Where It Goes: Outbound data becomes Jira issues/tickets in your Jira project. Inbound data updates vulnerability statuses and comments within SLASH.
- Purpose: To provide bi-directional synchronization between SLASH and your Jira project management system, keeping vulnerability remediation workflows in sync across both platforms.
- You Control: You configure which Jira project and issue type to use, how statuses map between platforms, and whether comment sync is enabled. You can disconnect anytime.
- No Jira User Data Stored: SLASH does not store any personally identifiable information about Jira users. We do not store names, emails, or account IDs from Jira. Comments synced from Jira are stored without author attribution to comply with Atlassian's user privacy guidelines.
- Authentication & Security: The Jira integration uses OAuth 2.0 for secure authorization. All OAuth tokens are encrypted at rest using AES-256-GCM. Inbound webhooks from Jira are authenticated using unique, cryptographically generated secret tokens per client.
- Audit Trail: All sync operations between SLASH and Jira are logged in an audit trail retained for 90 days, including sync direction, status, and timestamps. No user personal data is included in audit records.
- Third-Party Privacy: Data sent to Jira is subject to Atlassian's privacy policy (https://www.atlassian.com/legal/privacy-policy). SLASH complies with Atlassian's user privacy developer guidelines and does not store Jira user personal data.
You have the following rights regarding your personal information:
To exercise these rights, contact us at [email protected]. We will respond within 30 days.
We retain your information only as long as necessary:
After retention periods, data is securely deleted or anonymized.
SecurityWall stores Customer Data in accordance with industry best practices and compliance requirements:
We ensure that Customer Data storage complies with applicable data protection laws and industry regulations.
SecurityWall will remove Customer Data in accordance with the following policy:
- Legal obligations (e.g., court orders, regulatory requirements)
- Legitimate business interests (e.g., dispute resolution, fraud prevention)
- Industry standards (e.g., security assessment records retained for 7 years)
- Contractual obligations with customers
- Permanently deleted from active systems within 30 days
- Removed from backup systems within 90 days (backup rotation cycle)
- Securely overwritten to prevent recovery
- Verified through deletion audit logs
- Data may be archived (moved to secure, encrypted long-term storage) before final deletion if required for legal or compliance purposes
- Archived data remains encrypted and is only accessible for legal or regulatory purposes
- Archived data is subject to the same retention periods and will be permanently deleted upon expiration
For specific data removal requests or questions about our archival process, contact [email protected].
SecurityWall operates globally, and data may be transferred internationally:
Your data receives the same level of protection regardless of location.
We may update this Privacy Policy periodically:
We encourage you to review this policy regularly.
For privacy-related questions or to exercise your rights:
Email: [email protected]
Phone: +1 307 393 9425
Mail: SecurityWall, Sheridan, WY
Data Protection Officer: Available for GDPR and privacy inquiries
We're committed to protecting your privacy and will respond to all inquiries promptly.