Skip to content

Data Management Policy

2026.1

This policy outlines the requirements and controls/procedures Changineers has implemented to manage the end-to-end data lifecycle, from data creation/acquisition to retention and deletion.

Additionally, this policy outlines requirements and procedures to create and maintain retrievable exact copies of

PII and other critical customer/business data.

Data backup is an important part of the day-to-day operations of Changineers. To protect the confidentiality, integrity, and availability of sensitive and critical data, both for Changineers and Changineers Customers, complete backups are done daily to assure that data remains available when it needed and in case of a disaster.

Changineers policy requires that

(a) Data should be classified at time of creation or acquisition according to the Changineers data classification model, by labeling or tagging the data.

(b) Maintain an up-to-date inventory and data flows mapping of all critical data.

(c) All business data should be stored or replicated to a company controlled repository, including data on end-user computing systems.

(d) Data must be backed up according to its level defined in Changineers data classification.

(e) Data backup must be validated for integrity.

(f) Data retention period must be defined and comply with any and all applicable regulatory and contractual requirements. More specifically,

  • Data and records belonging to Changineers platform customer must be retained per Changineers product terms and conditions and/or specific contractual agreements.

(g) By default, all security documentation and audit trails are kept for a minimum of seven years, unless otherwise specified by Changineers data classification, specific regulations or contractual agreement.

(h) Data must remain in the environment it was created and not be copied or migrated to lower environments without explicit Customer permission.

Changineers defines the following four classifications of data:

  • Critical
  • Confidential
  • Internal
  • Public

Critical data includes data that must be protected due to regulatory requirements, privacy, and/or security sensitivities.

Unauthorized disclosure of critical data may result in major disruption to business operations, significant cost, irreparable reputation damage, and/or legal prosecution to the company.

External disclosure of critical data is strictly prohibited without an approved process and agreement in place.

Example Critical Data Types includes

  • PII
  • Production Security data, such as
    • Production secrets, passwords, access keys, certificates, etc.
    • Production security audit logs, events, and incident data

Confidential and proprietary data represents company secrets and is of significant value to the company.

Unauthorized disclosure may result in disruption to business operations and loss in value.

Disclosure requires the signing of NDA and management approval.

Example Confidential Data Types includes

  • Business plans
  • Employee/HR data
  • News and public announcements (pre-announcement)
  • Patents (pre-filing)
  • Specialized source codes
  • Non-production Security data, including
    • Non-prod secrets, passwords, access keys, certificates, etc.
    • Non-prod security audit logs, events, reports, and incident data
    • Audit/compliance reports, security architecture docs, etc.

Internal data contains information used for internal operations.

Unauthorized disclosure may cause undesirable outcome to business operations.

Disclosure requires management approval. NDA is usually required but may be waived on a case-by-case basis.

Example Internal Data Types includes

  • Internal documentation
  • Policies and procedures
  • Product roadmaps
  • Most source codes

Public data is Information intended for public consumption. Although non-confidential, the integrity and availability of public data should be protected.

Example Internal Data Types includes

  • News and public announcements (post-announcement)
  • Marketing materials
  • Product documentation
  • Contents posted on company website(s) and social media channel(s)

Requirements for data handling, such as the need for encryption and the duration of retention, are defined according to the Changineers Data Classifications.

DataLabeling or TaggingSegregated StorageEndpoint StorageEncrypt At RestEncrypt In TransitEncrypt In UseControlled AccessMonitoringDestruction at DisposalRetention PeriodBackup Recovery
CriticalRequiredRequiredProhibitedRequiredRequiredRequiredAccess is blocked to end users by default; Temporary access for privileged users onlyRequiredRequired7 years for audit trails; Varies for customer-owned data†Required
ConfidentialRequiredN/RAllowedRequiredRequiredRequiredAll access is based on need-to-knowRequiredRequired7 years for official documentation; Others vary based on business needRequired
InternalRequiredN/RAllowedN/RN/RN/RAll employees and contractors (read); Data owners and authorized individuals (write)N/RN/R7 years for official documentation; Others vary based on business needOptional
PublicN/RN/RAllowedN/RN/RN/REveryone (read); Data owners and authorized individuals (write)N/RN/RVaries based on business needOptional

N/R = Not Required

† customer-owned data is stored for as long as they remain as a Changineers customer, or as required by regulations such as HIPAA and GDPR, whichever is longer. Customer may request their data to be deleted at any time; unless retention is required by law.

Where possible, data remains within Changineers’s AWS Cloud infrastructure, and for the purposes of this policy AWS is not considered a “Vendor”. All data may be handled by AWS in a manner compliant with Changineers’s data protection policies.

Critical and Confidential data is by default not shared with 3rd parties, unless it is necessary for the functioning of the Changineers Platform and only with prior agreement from the Customer.

Examples when Critical or Confidential data may be shared:

  1. private conversations taking place in a video conference may transmit via an Australian TERN server for routing and media capture.

Ways that non-critical or non-confidential data may be shared:

  1. Anonymised user behaviour analytics may be captured in an analytics tool such as Google Analytics or Mixpanel
  2. User browser crash logs may be forwarded to a bug capture tool such as Sentry.io for detection.

Changineers Security team uses an automated system to query across our cloud-based infrastructure, including but is not limited to AWS, to obtain detailed records of all data repositories, including but not limited to:

  • Amazon API Gateways
  • Amazon S3 repositories
  • Amazon DynamoDB tables
  • AWS Lambdas
  • Source code repositories

The records are stored in a database system maintained by Changineers security team. Records are tagged with owner/project and classification when applicable. All records are kept up to date via automation. The system is also designed to track movement of data and update/alert accordingly.

AWS S3 Object Lifecycle Management

The Changineers platform uses Intelligent Tiering to automatically adjust the storage class for certain types of data based on its usage pattern and age. This allows the Changineers platform to provide competitive pricing while still allowing the customer to store large amounts of data.

AWS provides the following storage classes:

  • General Purpose
  • Infrequent Access
  • Archive (Amazon Glacier)

S3 lifecycle policies are used to manage the storage class for certain types of data. In most cases, the Changineers platform automatically adjusts the storage class but we may give customers the ability to adjust the storage class manually to meet their pricing or performance needs.

Changineers performs regular full backups of all production data. We leverage S3 lifecycle policies to automatically remove old backup data. This allows older data to “age out” instead of having to explicitly delete it. S3 lifecycle policies are also used to adjust the storage class of data backups based on the age of the backup.

Other Business Data

All internal and confidential business records and documents, such as product plans, business strategies, presentations and reports, are stored outside of an employee workstation or laptop.

  • Official records are stored in record management systems such as

    • GitHub (tickets),
    • GitHub (source code),
    • Google Drive (HR),
    • Xero (expense reports), etc.
  • Unstructured business documents such as Word documents, Excel spreadsheets and PowerPoint presentations are stored on Changineers internal file share.

  • Confidential business documents/records are be stored in encrypted form and with access control enabled on a need-to-know basis.

Transient Data Managemet

Data may be temporarily stored by a system for processing. For example, a storage device may be used to stage temp/raw files prior to being uploaded to the production environment in AWS. These transient data repositories are not intended for long term storage, and data is purged immediately after use.

Changineers currently does NOT use transient storage for any sensitive data.

Customer data is stored in the Changineers Production AWS account in three data stores:

  • Primary relational database: Amazon Aurora PostgreSQL, with automatic backups and point-in-time recovery enabled.
  • Supporting tables: Amazon DynamoDB tables, with point-in-time recovery enabled.
  • Content and media: Amazon S3, which provides 99.999999999% object durability.

All backups are encrypted in the same way as live production data (see Protecting Data At Rest).

On request, Changineers can provide customers with a snapshot of their data in the event they wish to migrate away from our services.

Changineers hosts its source code in private Git repositories on GitHub. Git is distributed, so every engineer’s clone is a complete copy of the repository history. Combined with GitHub’s durability guarantees, this is our recovery path if a repository is lost.

Business records (documents, presentations, spreadsheets, design files, meeting notes, approval records) are authored in and stored on Changineers Google Workspace (Drive). Google provides durability and version history for these files. Owners must save working copies to Drive rather than keep them only on local devices.

Unless a local workstation holds Critical data, device-level backups are self-managed by the device owner. If a cloud backup service is used (e.g. Google Drive), the data must be encrypted and protected by a password meeting Changineers password requirements.

Changineers has created and implemented the following procedures to make it easier for Changineers Customers to support data retention laws.

Some types of customer data may be automatically transitioned to a storage class that is appropriate for archival or infrequent usage. The guidelines for transitioning data to different storage classes is at the discretion of Changineers.

Customer data is retained for as long as the account is in active status. Data enters an expired state when the account is voluntarily closed. Expired account data will be retained for 14 days. After 14 days, the project/account and related data will be removed. Customers that wish to voluntarily close their account should download their data manually or via the API prior to closing their account.

If an account is involuntarily suspended, then there is a 14 day grace period during which the account will be inaccessible but can be re-opened if the customer meets their payment obligations and resolves any terms of service violations. If a customer wishes to manually backup their data in a suspended account, then they must ensure that their account is brought back to good standing so that the API and user interface will be available for their use. After 14 days, the suspended account will be closed and the data will be permanently removed (except when required by law to retain).

Changineers is NOT a covered entity. Should we become a covered entity in the future, we would be required by law to retain healthcare records for up to 10 years beyond when service was last provided when providing healthcare services directly to patients. Any patient data that is marked for deletion will be archived for the time required by law. This archived data can be retrieved by the customer as long as it is retrieved within 10 years from date of last service.

DateSummaryApproved by
2020-01Initial revision.James Gregory