Last updated: March 2026
App: Linked SLA Alerts (Atlassian Forge app for Jira Cloud).
Publisher: Tech Cache.
This Privacy Policy describes how Linked SLA Alerts accesses, uses, stores, and shares information when a customer installs and uses the app in their Jira Cloud site. It also briefly describes our marketing site (this site). This document supports transparency and Marketplace review; it is not legal advice—involve counsel for DPA wording, EU/UK roles, and enterprise procurement.
external.fetch in manifest.yml). That is customer-controlled, not a fixed Tech Cache “data pipeline.”Tech Cache develops Linked SLA Alerts.
Contact & Support: techcache@proton.me · Support & Security
Linked SLA Alerts is not directed at children and we do not knowingly collect personal information from children. It is a workplace app for organizations using Jira.
For processing inside your Jira Cloud tenant to provide the app, Tech Cache typically acts as a processor (or subprocessor in relation to your Atlassian relationship)—your organization and Atlassian shape much of the compliance picture.
Tech Cache may act as a controller for narrow activities (e.g. this marketing site, support email, or our own business records). Confirm with counsel, especially for EU/UK B2B and DPA needs.
| Category | Source | Use |
|---|---|---|
| Jira issue / work item data | Jira REST APIs as the installed app | SLA on the parent issue, linked keys, summaries, fields for comments/templates; JSM request SLA where read:request.sla:jira-service-management applies |
| Jira user identifiers & profile fields | Jira (assignee, reporter, watchers, users from custom “notify from field” rules) | @mentions, templates, Slack matching |
| Email addresses | Jira user/email APIs and issue expand (subject to visibility) | Slack users.lookupByEmail and related flows; optional static addresses in admin config; webhook payloads you configure |
| Slack member IDs | Admin mapping and/or self-service from the issue panel | DMs and mentions without email for mapped users |
| Secrets & integration config | Admin UI | Slack bot token, webhook URLs, channel IDs, templates, triggers—stored in Forge storage:app |
| Forge Key-Value Store | Runtime | Admin config, dedupe keys, Slack ID map, Marketplace license status used for entitlement checks |
| Invoking user context | Forge / asUser where used |
Who ran an action; test flows (e.g. /myself) |
We do not describe a bulk export of your entire Jira database or a continuous off-site replica of Jira; processing is event-driven—primarily when a user opens or refreshes the Linked SLA Alerts issue panel on the parent issue (and when you use on-demand Send SLA Alert), plus admin configuration saves—not a Forge scheduled job watching issues in the background.
We do not use personal data for solely automated decisions that produce legal or similarly significant effects about individuals (as that phrase is used in some privacy laws). SLA notifications and routing are operational alerts based on your Jira configuration and rules.
external.fetch allowlist, you choose among those permitted destinations. Data is sent under your configuration; those providers process data under their terms. They are not “Tech Cache subprocessors” in the same sense as Atlassian, though your counsel may treat them as your subprocessors.Why the app accesses email: Primarily to match Jira users to Slack accounts (e.g. Slack users.lookupByEmail) when DMs or Slack delivery depend on email, and to include recipient-related fields in email-style webhook payloads you enable.
How: Through Jira Cloud REST APIs permitted by install scopes (including read:email-address:jira where declared). Visibility of email is controlled by Atlassian, organization, and user settings; some users may have no email visible to the app.
Stored vs. transient:
| Configuration | What happens | Data that may leave Atlassian |
|---|---|---|
| Incoming webhook | POST to URL you provide | Message text, issue keys, links, formatting you configured |
| Bot token + channel | API calls to Slack with your token | Channel ID, message payload; token sent in Authorization (HTTPS) |
| Direct messages (DMs) | Slack API to open DM / post as your Slack app | Issue/SLA text you put in templates; Slack user IDs; may use email lookup or admin/user Slack ID map |
DMs appear as messages from your Slack app/bot. Content may identify individuals through work context (assignments, issue keys). Admin configures defaults; users may map their own Slack ID where the product allows. Admins can turn off self-service Slack ID linking so that only admin-managed mappings apply (product setting).
If you enable an email or automation webhook via an integration whose endpoint hostname is on the app’s Forge external.fetch allowlist (e.g. Zapier or Make—not arbitrary URLs), the app sends HTTPS POST requests to that endpoint when a notification is actually sent (after a panel evaluation or on-demand action matches your rules and deduping). JSON bodies typically include event type, parent and linked issue keys, SLA status and timing, message and subject text from your templates, and recipient-related fields where your settings supply them. Only configure endpoints you trust. Outbound calls are limited to hostnames on the Forge external.fetch allowlist in the published manifest.yml for your app version (exact entries can change between releases—check the manifest for the current list). Illustrative categories include Atlassian product domains (e.g. *.atlassian.net), Slack (hooks.slack.com, slack.com), Zapier (hooks.zapier.com), and Make regional webhook hosts (e.g. hook.eu1.make.com, hook.us1.make.com—subject to change in the manifest).
| Destination | What may be sent | Control |
|---|---|---|
| Slack | Messages, API payloads (may include email in lookup requests, user IDs, tokens in headers) | Your Slack app, webhook, token, channel, DM settings |
Zapier / Make (and any other provider whose hostname appears on the external.fetch allowlist in manifest.yml) |
JSON webhook body per your config | Destination you choose only among allowlisted hosts (see §9); not a free-form “any HTTPS URL” integration |
Jira Cloud (*.atlassian.net) |
Normal API traffic | Core product |
Forge KVS holds app settings and operational keys—not a separate Tech Cache issue warehouse.
Exact scopes and external fetch allowlist are in your manifest.yml (keep this policy and the Marketplace listing aligned). Illustrative permissions:
read:jira-work, read:jira-user, read:email-address:jira, write:jira-work, storage:app, read:request.sla:jira-service-management (if JSM SLA is used)We do not claim SOC 2, ISO 27001, or other certifications unless you have actually achieved them and list them accurately.
For data in Jira, contact your organization admin and Atlassian. For support mail or other records Tech Cache holds, contact techcache@proton.me. A published informational DPA is available (not yet reviewed by Tech Cache’s counsel—use your own legal advice). See also Terms and Legal & Trust.
Static hosting (e.g. GitHub Pages); may generate technical/CDN logs. We do not intend to use advertising cookies or third-party analytics on this site as of the last updated date; if that changes, we will update this policy.
We will update the Last updated date when we make material changes. Significant changes to how the app handles data will also be reflected in Marketplace listing notes or documentation when practical.
Tech Cache — techcache@proton.me · Support & Security · Legal & Trust