Data
Data are backups and stored in highly available and durable storage within AWS.
In the unlikely event that a failure occurs in the data area, the service will be restored from the backups stated below.
Recovering deleted data
We do not provide a restoration service for deleted project data.
When a project is deleted, categories, issues, and comments will be deleted altogether. Please be cautious when you delete projects or issues.
Data backup
To avoid any data loss due to server or data area failure, we have taken the following preventive measures to restore the data for the past 30 days.
Database
- All data is backed up to different servers in real-time.
- Data areas are backed up daily and 30 times of backups are kept.
Shared files, Git, and Subversion
- Data areas are backed up twice a day and 60 times of backups are kept.
Security policy
We are committed to providing a secure environment to our customers.
We do not share your data with outside parties. Access to your data is limited to you and other users that you've allowed to access your work, except in the case of emergencies, i.e., fixing hardware problems.
We also periodically backup your data to prevent data loss.
We will delete your data immediately upon your request.
Systems and equipment
Data center
The servers are located in a data center with 24/7/365 surveillance and security.
OS
Our server has Linux installed.
Auto Updates of security patch
We maintain security by updating the server software to protect our users from security problems automatically.
We also have a reliable security system even if server software updates cannot occur automatically.
Disabling unnecessary services and ports
We disable unnecessary services that are initially programmed to start by default. We also publicize the minimum numbers of ports.
Firewall
A firewall prevents unauthorized access to the server.
Encrypted data transfer by SSL
With SSL, the communication between the web browser and the server is encrypted. It helps to prevent your data getting lost, being edited, or spoofing.
Backlog security
Backlog strives for higher security. We always verify the common attacks (such as XSS).
If there are any problems, we notify our users on the “bugs and requests” or “system failure information” websites immediately and deal with these problems promptly.