Updated on December 12, 2020
The protection of your personal information is our priority. We want you to feel safe while using our apps and add-ins. However, add-ins would not work if we didn't collect certain data. On this page, you can find detailed information on what data we collect, how we protect it, and where we store it.
When you enter your name, username, email address, password and subscription plans. We collect this information so that you could log in to your account.
We collect log files only locally, on your computers. In the logs, we save only technical information that may help us provide you with technical support service or fix technical issues. We do not send these logs to any servers or services, but we may ask you to send your local logs to our technical specialists to help us reproduce or resolve your issue.
When you contact our customer support service, we keep all your email and chat messages.
Your use of our products does not give us access to any Personal Data stored in your Microsoft Office account, such as name, email address, physical address, or credit card details.
When you run our product for the first time, you will see a consent screen with the permissions it requires to work.
Add-ins can send data over the Internet.
In order for our add-ins to provide their services, they need access to read from your OneDrive files and write back to them. The records are processed within Microsoft Office Graph services, we do not collect or store any data from your files.
This permission allows the add-ins to save the settings you select. The settings are stored in your Office Account storage.
This one is required so you could see our icons, pictures, and other static resources that we store on Amazon Content Delivery Network.
Excel add-ins can read and make changes to your Excel documents.
Outlook add-in can read or modify the contents of any item in your mailbox and create new items. It can access personal information, such as the body, subject, sender, recipients, or attachments, in any message or calendar item. It may send this data to a third-party service.
The personal data are stored in a cloud-based database hosted by Amazon Web Services. This is a
protected storage inside an isolated private network. All data can only be accessed through our add-ins.
We do not collect any analytics data and data about your devices and software. We do not track
your actions by using tracking technologies or telemetry. Also, we do not sell or pass your personal data to any 3rd parties.
You may find that Microsoft Office telemetry is run together with the add-in. This is because we use Microsoft's office.js framework.
This clause refers your personal data, i.e. your name, username, email address, teams, subscriptions and orders.
We develop and test our products on specially created testing configurations, so access to your data is very limited and only a few people at our office have permissions.
Full access (provided on request) is given to a couple of our core developers and only in case they need to figure out some complex technical thing.
Read-only access is provided to our senior system administrator to perform online monitoring and periodic maintenance of our servers and services.
Read-only access is also given to our technical support engineers and sales specialists. They need your data to assist you when you contact us with related questions.
We make a lot of effort to keep your data safe. Firstly, we restrict physical access to our office and to our computers with door locking, access control systems, alarm system and surveillance facilities. Secondly, we restrict access to our systems by using central management of system access, no guest accounts policy, password and authentication policies.
Also, we control access to data with the help of differentiated access rights, access rights defined according to duties, measures to prevent the use of automated data-processing systems by unauthorized persons.
To prevent unauthorized access, data alteration and disclosure, all our communication channels are encrypted using virtual private networks for remote access, transport and communication of data. All our sub-networks are joined into a wholly-owned private network. Finally, all our computers are protected with antivirus software and firewall systems.
To delete your data, remove your account in the Profile section. To have all your communications
with us removed from our systems, please contact our technical support service.
You can see all the information that is sent to our services and storages with your own eyes with the help of the Fiddler tool or your browser console. Also, you can inspect our client-side source code directly in your web browser.