Security, privacy and compliance
Last updated
Last updated
Jam’s data privacy and security practices adhere to rigorous enterprise standards. Our infrastructure, data policies and internal corporate processes have been run through extensive security tests by third-party auditors.
Our security policies are supported by quarterly vulnerability tests, and annual exercises as dictated by SOC 2 Type II requirements.
Read more about Jam's security practices and compliance measures below.
Jam is SOC 2 Type II compliant. We are happy to share our SOC 2 Type 2 report with qualified customers. You can email security@jam.dev to request the report.
Jam uses Google Cloud Platform as the cloud provider to store data. For GCP, we use the Central US region. Jam uses Cloudflare for CDN. The Chrome extension is distributed through Google’s Chrome app store.
Yes. Our data retention period depends on the frequency of the snapshots.
Frequency | Retention period |
---|---|
Yes. Data is encrypted at rest (AES-256) and in transit (HTTPS/TLS).
Access to our cloud services, source code, third-party tools etc. are secured with 2FA.
We take security very seriously. We review security issues as soon as we learn about them. We let our users know if they are affected by any security incident.
Jam uses Cloudflare as a mechanism to prevent attacks on our environment, as well as have firewalls and controls within our GCP project. However it does not have an IDS or IPS running in our production network because the network is fully operated by GCP.
Jam is using GitHub to store our source code. GitHub provides a vulnerability feed of issues that become known in third party software dependencies used by our source code.
If you notice a security issue or have a question or concern, you can reach out to us at security@jam.dev and we'll respond as soon as possible. Currently, Jam does not have a bug bounty program.
Hourly
2 days
Daily
7 days
Weekly
4 weeks
Monthly
12 months