Close

Data Transfer Impact Assessment

Introduction

This Data Transfer Impact Assessment (“DTIA”) serves the purpose of assisting Atlassian customers as well as Forge developers in conducting a risk assessment for the transfer of personal data in connection with Atlassian’s provision of its Cloud Products, Support, and Services (together, “Services”), and Forge Platform (“Forge”), and subsequent processing of such personal data by Atlassian, its Affiliates and sub-processors in light of the “Schrems II” ruling of the Court of Justice for the European Union and the subsequent recommendations from the European Data Protection Board. The DTIA supplements the information necessary for compliance with data transfer provisions under the European Data Protection Law as defined in our Atlassian Data Processing Addendum (Atlassian DPA) and Forge Data Processing Addendum (Forge DPA).

As a provider of global services, Atlassian runs its services with common operational practices and features across multiple jurisdictions. Therefore, we store personal data in data centers located in the United States, EMEA, and APAC, further outlined in our data residency documentation, and process it in other locations worldwide for the provision of products, features, as well as customer and technical support purposes.

Under the European Data Protection Laws, personal data may not be transferred outside of Europe unless (i) the importing country has been deemed adequate by the relevant governmental body; or (ii) the data exporter has appropriate safeguards in place to ensure that personal data transferred is subject to an adequate level of protection. Those safeguards are referred to as “transfer mechanisms.”

The Atlassian DPA incorporates the Standard Contractual Clauses (as defined in the DPA) as such transfer mechanism as follows:

  • Where personal data protected by the GDPR is transferred to Atlassian outside of Europe, Atlassian relies upon the EU Standard Contractual Clauses (SCCs) to provide an appropriate safeguard for the transfer. Under the SCCs, our Customers are acting as the "Data Exporter" and Atlassian is the "Data Importer".
  • Where personal data protected by the UK Data Protection Law, Atlassian relies on the UK Addendum in our DPA in accordance with the ICO guidance from 2022.
  • Where personal data is protected by the Swiss Federal Act on Data Protection is transferred to Atlassian outside of Europe, Atlassian relies upon the EU SCCs plus certain interpretative provisions to make the SCCs work for Switzerland's legal regime.

Furthermore, Atlassian participates in and certifies compliance with the Data Privacy Framework. You can find more information in our Privacy Notice under the Section “Data Privacy Framework Notice.” Where adequacy does not apply, we continue to rely on the Standard Contractual Clauses (SCCs) as a transfer mechanism.

Scope of the Data Transfer Impact Assessment

Please note, that the processing locations depend on which Cloud Products you as a customer may have purchased, e.g. if you have purchased Jira Align, the relevant sub-processors and processing locations may be different (as listed under our sub-processor page) from the sub-processors and locations applicable for Trello, or Confluence. Additionally, you may also configure data residency for certain data in those Cloud Products which could further reduce the scope of transfers indicated on this page. Therefore, please review the sub-processor page and the data residency page in connection with the Cloud Products you have purchased in order to draw relevant information from this document.

The Atlassian DTIA is scoped to cover direct and onward data transfers in connection with Atlassian’s provision of Services as well as the Forge Platform. The processing activities (incl. transfers) are outlined in the Atlassian DPA and Forge DPA respectively.

Atlassian processes personal data in a number of jurisdictions, which includes transferring the data out of Europe/EEA, the UK, and Switzerland (together, “Europe”) to both, countries holding adequacy status under the European Data Protection Laws (as defined in Atlassian’s Data Processing Addendums), and third countries, as outlined below:

Europe/EEA and Adequate Countries

Bulgaria, France, Germany, Ireland, Netherlands, Poland, Sweden; Canada, Japan, New Zealand, United Kingdon, United states

Third Countries

Australia, Brazil, India, Malaysia, Mexico, Philippines, Turkey

Canada, Japan, New Zealand, and the United States* (only commercial organizations participating in the Data Privacy Framework) offer an adequate level of data protection under European Data Protection Laws. The effect of such a decision is that personal data can flow from the EU (and Norway, Liechtenstein, and Iceland), UK, and Switzerland to these third countries without any transfer impact assessment nor further safeguard being necessary. Transfers to these countries are assimilated into intra-European data transfers.

Specifically for the data transfers to the United States, Atlassian US., Inc., and its US affiliates participate in and certify compliance with the Data Privacy Framework Principles. You can find more information in our Privacy Notice under the Section “Data Privacy Framework Notice.” Where adequacy does not apply, we continue to rely on the Standard Contractual Clauses (SCCs) as a transfer mechanism. The EU Commission confirmed in its FAQs that all safeguards that have been put in place by the US Government in the area of national security (including the redress mechanism) apply to all data transfers under the GDPR to companies in the US regardless of the transfer mechanism used. These safeguards therefore also facilitate the use of other tools, such as standard contractual clauses and binding corporate rules.

Our analysis of transfers to third countries is described below. Please note that the transfers apply to all Atlassian Services and Forge:

Australia

Step 2: Identify the transfer tool relied upon

Purpose for transfer and any further processing

Direct transfers: Atlassian has offices in Australia where our employees may access personal data for the purposes of the provision of Services and Forge Platform.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page. Atlassian also offers data residency in accordance with this page.

The frequency of the transfer

Direct transfers: Continuous.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: As detailed in Atlassian DPA and Forge DPA respectively.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Determined at the sole discretion of the data exporter.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page.

Applicable transfer mechanism

Direct transfers: Standard Contractual Clauses between Atlassian and its customers, or Forge developers, respectively.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

Australia has various laws, legislation and executive powers that could be used to compel companies to disclose personal data, or that provides for investigation and enforcement agencies to obtain data where there is a suspected contravention. A high-level summary of several of the key laws is provided below:

  • Crimes Act 1914 (Cth) and the Criminal Code Act 1995 (Cth), which permits government agencies to collect both electronic and physical data where there are reasonable grounds to believe there is a criminal offense.

  • Surveillance Devices Act 2004 (Cth) and equivalent state and territory laws that grant authorities covert access to electronic and physical data.

  • Telecommunications (Interception and Access) Act 1979 (Cth) and Part 15 of the Telecommunications Act 1997 (Cth) grants government bodies powers to oblige telecommunications carriers, carriage service providers, and other communications providers to assist law enforcement and intelligence agencies.

For aspects of each of the above laws, there are potential extra-territorial powers that could theoretically compel those outside of Australia to assist in the investigative process. However, in practice, it is highly unlikely that law enforcement and surveillance authorities will be able to do so without operating through existing bilateral processes, such as mutual legal assistance treaties. In practice, it can be difficult to determine how governmental authorities use all of their powers to conduct surveillance and collect data (and therefore whether it involves unnecessary or disproportionate data access in any circumstances) because in several cases, government authorities are not required to publicly report on when and how they use these powers (although independent oversight and review, including reporting to independent statutory authorities, is embedded throughout the surveillance legislation framework). In addition, not all requests for access to data and surveillance are currently subject to prior independent judicial authorization, although a process for review and reform of Australia’s surveillance laws has commenced and this may change in the future.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Brazil

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

The Brazilian government can only access/intercept personal data for certain specified purposes including, but not limited to, criminal law enforcement and surveillance, as further described below, and after authorization of a court.

A high-level summary of the key laws is provided below:

  • Wiretapping and Information Systems Surveillance Law - allows interception of Brazilian telephone lines and information systems. All interception must be approved through court order and not be longer than 15 days.

  • Brazilian Intelligence Agency (Agência Brasileira de Inteligência - ABIN) - establishes that ABIN can only request data from other government agencies/authorities which are part of the Brazilian System of Intelligence.

  • The Brazilian Internet Civil Rights Framework (Law No 12,965) – establishes a) where a non-Brazilian company has a data center in Brazil, the Brazilian law applies, b) requires internet connection and application providers to keep connection and access logs (IP, date and time of use) for 12 months (internet connection) and 6 months (application access) and c) if a company violates the Brazilian Internet Civil Rights Framework sanctions may apply such as warnings, fines, suspension and prohibition.

  • Encryption - The Federal Supreme Court has on hold two trials that may decide if a court can apply sanctions for noncompliance with a court order to reverse/access encrypted data.

The Brazilian General Data Protection Law ("LGPD") is mostly aligned with the GDPR, therefore it provides a similar level of protection, but it does not apply to national security or criminal matters. However, the country has not yet been evaluated in order to obtain an adequacy decision from the European Data Protection Board.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

India

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

India has various surveillance, criminal, and security laws which allow government agencies to intercept and access "personal information" and "sensitive personal data or information" without obtaining their prior consent if relevant factors apply.

A high-level summary of the key laws is provided below. Note that these laws are often applied together, so criminal laws cannot be distinguished from surveillance specific laws.

  • Information Technology Act, 2000 - empowers government agencies to intercept any information generated, transmitted, received, or stored in any computer resource. This can be in the interest of the sovereignty, integrity of India, security, and defense of India, etc. A subsection of the act grants the central government power to authorize any government agency to monitor and collect traffic data to enhance cybersecurity, identification, analysis, and prevention of intrusion or spread of a computer containment.

  • Indian Telegraph Act, 1885 - confers upon the Indian government the right to conduct surveillance over telegraph lines but only upon the occurrence of a public emergency or the interest of public safety.

  • Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (SPDI Rules) - sensitive personal data or information may be shared without obtaining the prior consent of the data subject with a government agency if such activity is mandated under law for verification of identity, prevention, detection and investigation purposes, including cyber incidents, prosecution and punishment of offenses.

  • Criminal Laws and Code of Criminal Procedure, 1973 (CrPC) - grants courts and investigating officers, by way of a written order, to require any person in whose possession or power a document or thing lies to produce the same where necessary or desirable for the purposes of an investigation, inquiry, trial or other proceedings.

Since the scope of the surveillance and interception powers of Indian authorities extends to investigations carried out in respect of any persons, companies, and entities operating within India (including those doing business in India from offshore), any data recipient is potentially within the scope of such criminal law enforcement and shall be obligated to share data available with it if called upon by a government authority. The CrPC applies to the territory of India and accordingly, an offshore entity is not under an obligation to comply with the request, however, if the offshore entity has a presence in India, the CrPC would extend to such operations within India.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Mexico

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

Private entities that are obligated to comply with the Protection of Personal Data held by Private Parties ('LFPDPPP') legislation must process data in some manner in connection with Mexico and therefore have to respond to demands by Mexican authorities to disclose those personal data (assuming the demand is otherwise lawful).

Atlassian is potentially within the scope of the importing territory's governmental security and surveillance powers if the data importer obtains personal data that falls under the definition of “data processing” in the LFPDPPP. Under Mexican Data Protection Laws, the transfer of data turns the receiver into a data controller. The scope of application of LFPDPPP and its Regulations is when the processing:

  1. is carried out in an establishment of the data controller located in Mexico;
  2. is carried out by a data processor, regardless of its location, on behalf of a data controller established in Mexico;
  3. the data controller is not established in Mexico but is subject to Mexican laws as a consequence of entering into a contract that is governed by Mexican law or to which Mexican jurisdiction extends under international law; or
  4. the data controller is not established in Mexico but uses equipment/media located in Mexico, unless such media are used only for transit purposes that do not involve processing. For this case, the data controller shall provide the media necessary to comply with the obligations imposed by the referred laws.

Mexican Authorities will argue that the data importer has the data and they may exercise their powers.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Philippines

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

The Philippines has enacted specific laws that enable law enforcement authorities and military personnel to obtain access to data, including personal data being processed in the Philippines and held by private organizations. In addition, the powers of government authorities enable them to request / access data stored in Europe but which are accessed by individuals located in the Philippines, as long as the person or entity sought to be enjoined is subject to the jurisdiction of the Philippine government.

A high-level summary of the key laws is provided below:

  • The Philippine Constitution of 1987 – this allows exceptions to the right to privacy, which means that data (including personal data) can be accessed however law enforcers must first obtain a warrant with the proper court.
  • Republic Act (R.A.) No. 11479 or the “The Anti-Terrorism Act of 2020” (ATA) – this allows law enforcers or military personnel to have access to, read, collect, or record, any private communication, conversation, discussion, data, information, or messages in whatever form, kind or nature, when it takes place between terrorists / terrorist organizations.
  • Anti-Wiretapping Act (R.A. 4200) - while it is generally prohibited for any person to secretly tap, intercept, or record private communications between individuals, the law provides for an exception when any police officer has obtained a court order.
  • Cybercrime Prevention Act (R.A. No. 10175) - authorizes law enforcement authorities, upon securing a court warrant, may require any person or telecommunications service providers to preserve, disclose, or submit subscriber information, traffic data, or relevant data in its possession or control in relation to the prosecution of a crime committed through a computer network or the use of electronic communications devices. Service providers are required to preserve the integrity of traffic data and subscriber information for a minimum period of six months from the date of the transaction.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Malaysia

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

There are laws and regulations in Malaysia that grant surveillance powers and various laws confer public authorities the right to access and intercept data, which are not limited to instances concerning matters of national security. The power to intercept communications, and to exercise powers to search and seize data, can be exercised for the purpose of any investigation into an offence under the relevant law.

A high-level summary of the key laws is provided below:

  • Criminal Procedure Code (CPC): search and interception - public authorities can generally access data in order to prevent, detect and prosecute crimes. The term "access" is broadly understood as the login and password data (if any), the encryption or decryption key (if any), and more generally any information that will enable police officers to have access to the raw data and access to any software or hardware. Law enforcement and intelligence authorities enjoy very wide powers to intercept communications, if such communication may serve as a piece of evidence for a criminal offense.
  • Security Offences (Special Measures) Act 2012 (SOSMA) – grants any police officer or any other person, with authorization of the Public Prosecutor, the power to intercept any communications (which includes any message transmitted or received by any communication).

  • Communications and Multimedia Act 1998 (CMA) - grants a police officer the power to carry out a search operation and access computerized data, with or without a warrant, if a relevant offense is suspected. The CMA has extraterritorial effects, and it applies both within and outside Malaysia.

  • Computer Crimes Act 1997 (CCA) – grants a police officer the power to search an organization's premises, if it first obtains a warrant issued by a Magistrate and when there is reasonable cause to believe that a piece of evidence relates to the commission of an offense under the CCA. The CCA has extraterritorial effects given that it applies both within and outside Malaysia.

  • Income Tax Act 1967 (ITA) - provides for the power of the Director General of Inland Revenue (Director General), to require any person to provide all such information or particulars as may be demanded by him for the purposes of the ITA.

  • Malaysian Anti-Corruption Commission Act 2009 (MACC Act) – grants, in certain circumstances, the power for an officer to enter any premises and search, seize, and take possession of any book, document, record, account data, or other article. It also grants officers of the MACC powers to intercept communications, where they consider that such communication is likely to contain any information which is relevant for the purpose of any investigation into an offense under the MACC Act.

  • Sales Tax Act 2018 and Service Tax Act 2018 (SST Act) - grant wide powers to authorities to request access to relevant sales tax information.

  • Personal Data Protection Act 2010 (PDPA) – permits personal data to be disclosed if it is necessary to prevent or detect a crime, or if such disclosure is required by law.

Public officers can exercise the enforcement powers set out in the PDPA and carry out search and seizure operations and access computerised data and information.

No extraterritorial effect: It is important to note that Malaysian public authorities would not be able to enforce most of the abovementioned laws against foreign entities not present in Malaysia. The rights granted to public authorities under the laws above to access data, and to exercise powers of search and seizure, are granted vis-à-vis entities who are based in Malaysia. As such, Malaysian public authorities would need to seek the collaboration of their foreign counterparts in order to access personal data stored in the EU by entities outside Malaysia.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Turkey

Purpose for transfer and any further processing

Direct transfers: Not applicable.

Onward transfers: Atlassian transfers Customer Personal Data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Not applicable.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: Not applicable.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: Not applicable.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Not applicable.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

A high-level summary of the key laws relevant in Turkey is provided below:

  • Constitution of the Republic of Turkey - establishes that any interference with fundamental rights and freedoms must be proportionate and in compliance with the essence of the Constitution and the requirements of the democratic and secular system. However, under extreme circumstances (e.g., war, mobilization, or state of emergency), the exercise of fundamental rights and freedoms may be partially or entirely suspended to the extent required by the requirements of the situation, as long as this does not violate any obligations under international law
  • Criminal Procedural Code No. 5271 (CPC) – permits communications that are at a post office to be seized, if there is probable cause that they constitute evidence of a crime. Evidence can also be obtained by interception of correspondence through telecommunications, provided certain conditions are met (such as lack of alternative methods, relation to specific crimes, etc.).
  • Electronic Communications Law No. 5809 (ECL) – grants, in the context of its duties, the relevant authority the power to request any type of document or information from individuals, private and public entities.
  • Protection of Competition Law No. 4054 (only available in Turkish) – establishes the Competition Authority's right to supervise and inspect all information, documents, and ledger of any organization.
  • State Intelligence Services and National Intelligence Organisation Law No. 2937 (only available in Turkish) ("State Intelligence Services Law") – Turkish intelligence services are entitled to request any type of document or information from individuals, private or public entities. They may also intercept communications provided a judge authorizes it, or a written order issued by the relevant authority's senior official in cases of disclosure of state secrets or the activities of terrorism.

Extraterritorial effect: the governmental or state authorities’ powers to request documents from organizations are not limited to information located in Turkey (if servers are located in Europe). The same principle applies to tapping into the communication of individuals by judicial decision. In a two-ended conversation, if one of the persons is located in Europe or is a European citizen, the National Intelligence Organisation will still be able to collect the necessary information.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

United States*

Purpose for transfer and any further processing

Direct transfers: Atlassian has offices in the United States where our employees may access personal data for the purposes of the provision of Services and Forge.

Onward transfers: Atlassian transfers personal data to its sub-processors for the purposes of assisting in the provision of Services as well as Forge as further outlined in our sub-processor page.

The frequency of the transfer

Direct transfers: Continuous.

Onward transfers: Continuous.

Categories of personal data transferred

Direct transfers: As detailed in Atlassian DPA and Forge DPA respectively.

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Sensitive data transferred (if applicable)

Direct transfers: None.

Onward transfers: Determined at the sole discretion of the data exporter.

Length of processing chain

Onward transfers: Please refer to Atlassian's sub-processor page for more information.

Applicable transfer mechanism

Direct transfers: Atlassian’s DPF Certification for the contractual relationship between Atlassian and its customers, or Forge developers, respectively.

Onward transfers: Standard Contractual Clauses between Atlassian and its sub-processors. Atlassian imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

Identifying laws and practices relevant in light of all circumstances of the transfer

The following US laws were identified by the Court of Justice of the European Union in Schrems II as being potential obstacles to ensuring essentially equivalent protection for personal data in the US:

  • FISA Section 702 (“FISA 702”) – allows US government authorities to compel disclosure of information about non-US persons located outside the US for the purposes of foreign intelligence information gathering.
  • Executive Order 12333 ("EO 12333") - authorizes intelligence agencies (like the US National Security Agency) to conduct surveillance outside of the US. In particular, it provides authority for US intelligence agencies to collect foreign "signals intelligence" information, being information collected from communications and other data passed or accessible by radio, wire, and other electromagnetic means.

Further information about these U.S. surveillance laws can be found in the U.S. Privacy Safeguards Relevant to SCCs and Other EU Legal Bases for EU-U.S.Data Transfers after Schrems II whitepaper from September 2020. As for the CLOUD Act, please refer to What is the CLOUD Act? by BSA Software Alliance outlining the scope of the CLOUD Act.

With the Data Privacy Framework, Europe introduced the adequacy framework for US companies that self-certify under the DPF. An essential element of the adequacy decision was the updated US legal framework, e.g. Executive Order on “Enhancing Safeguards for United States Signals Intelligence Activities”, which was signed by President Biden on 7 October and is accompanied by regulations adopted by the Attorney General. These instruments were adopted to address the issues raised by the Court of Justice in its Schrems II judgment.

For Europeans whose personal data is transferred to the US, the Executive Order provides for:

  • Binding safeguards that limit access to data by US intelligence authorities to what is necessary and proportionate to protect national security;
  • Enhanced oversight of activities by US intelligence services to ensure compliance with limitations on surveillance activities; and
  • The establishment of an independent and impartial redress mechanism, which includes a new Data Protection Review Court to investigate and resolve complaints regarding access to their data by US national security authorities.

Atlassian US, Inc. and its US affiliates participate in and certify compliance with the Data Privacy Framework Principles. Our US entities are now able to rely on the adequacy decision to receive EU personal data. You can find more information in our Privacy Notice under the Section “Data Privacy Framework Notice.

Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. Atlassian also publishes an annual Transparency Report with information about government requests to access data.

Supplemental Measures

In order to protect personal data in accordance with Applicable Data Protection Laws, Atlassian implements the following supplemental technical, contractual, and organizational measures:

Technical Measures

Atlassian provides the following technical measures to provide additional security for personal data:

Contractual Measures

Atlassian’s contractual measures are set out in our Data Processing Addendum which incorporates the SCCs, as well as UK Addendum and Swiss modifications for SCCs. In particular, we are subject to the following requirements:

  • Technical measures: Atlassian is contractually obligated to have in place appropriate technical and organizational measures to safeguard personal data (both under the Customer and Forge DPAs as well as the SCCs we enter into with customers, service providers, and between entities with the Atlassian group).
  • Transparency: Atlassian is obligated under the SCCs to notify its customers and Forge developers in the event it is made subject to a request for government access to customer personal data from a government authority. In the event that Atlassian is legally prohibited from making such a disclosure, Atlassian is contractually obligated to challenge such prohibition and seek a waiver.
  • Actions to challenge access: Under the SCCs, Atlassian is obligated to review the legality of government authority access requests and challenge such requests where they are considered to be unlawful.

Organizational Measures

Atlassian’s organizational measures to secure data include:

  • Policy for government access: Atlassian publishes and follows Atlassian Guidelines for Law Enforcement Requests in responding to any government requests for data. To obtain data from Atlassian, law enforcement officials must provide legal process appropriate for the type of information sought, such as a subpoena, court order, or a warrant.
  • Atlassian publishes its annual Transparency Report with information about government requests to access data.
  • Onward transfers: Whenever we share your data with Atlassian service providers, we remain accountable to you for how it is used. We require all service providers to undergo a thorough cross-functional diligence process by subject matter experts in our Security, Privacy, and Risk & Compliance Teams to ensure our customers and Forge developers' personal data receives adequate protection. This process includes a review of the data Atlassian plans to share with the service provider and the associated level of risk, the supplier’s security policies, measures, and third-party audits, and whether the supplier has a mature privacy program that respects the rights of data subjects. We provide a list of our sub-processors on our sub-processors page.
  • Privacy by design: Atlassian’s Privacy Principles outline Atlassian’s approach to privacy, and more detailed information on privacy in our machine learning intelligent experiences is available here.
  • Employee training: Atlassian provides data protection training to all Atlassian staff globally.

Re-evaluating at appropriate intervals

Atlassian will review and, if necessary, reconsider the risks involved and the measures it has implemented to address changing data privacy regulations and risk environments associated with transfers of personal data outside of Europe.

Legal Notice: Customers and Forge developers are responsible for making their own independent assessment of the information in this document. This document: (a) is for informational purposes only, (b) represents current Atlassian product offerings, services, and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from Atlassian and its affiliates, suppliers, or licensors. The responsibilities and liabilities of Atlassian to its customers are controlled by Atlassian agreements, and this document is not part of, nor does it modify, any agreement between Atlassian and its customers, or Atlassian and Forge developers.


Related content

Cloud 이용 약관

제품별 약관

데이터 처리 부록

Business Associate Agreement

Stay informed

Subscribe to receive notifications from us about updates to our legal terms (including our legal policies) and our list of sub-processors.