LoginFree TrialGo To Showroom

Security & privacy

General

GDPR-compliant

We attach great importance to data security and data protection and work in compliance with GDPR, which is why hundreds of well-known customers rely on Just Social. This includes companies and organizations from all sectors and types:

  • agencies
  • banks
  • service companies
  • universities
  • industrial companies
  • Chambers of Industry and Commerce (IHKs)
  • churches
  • health insurance companies
  • schools
  • Cities, municipalities and districts
  • trusts
  • associations
  • ...

Order processing contract (AVV)

Of course, you can conclude an order processing agreement (AV or AVV) with us on the basis of the EU General Data Protection Regulation applicable from May 25, 2018 in accordance with Art. 28 GDPR in accordance with the latest version.

You can easily do this electronically: This saves everyone involved effort and yet provides a legally secure data protection basis for our future cooperation.

Order processing contract

Audits and attestations

We have our systems and processes regularly checked and optimized by the management consultancy audatis with regard to data security and data protection. You can download the latest certificate here:

View data protection certificate

audatis specializes in the areas of data protection and information security and advises renowned clients from various industries. Our data protection officer Carsten Knoop is founder and managing director of audatis and was previously Chief Information Security Officer (CISO) at Bertelsmann AG. He has many years of experience and excellent expertise in the field.

More info about audatis

Penetration testing

Just Social has been reviewed in the past by customer representatives, external pentesters. We now have the appropriate expertise in our team and employ a professional internal pentester. This has the following benefits:

  • Just Social is subject to continuous pentests (instead of just selectively)
  • We can check features etc. accordingly during development and improve them if necessary
  • Thanks to internal pentesting, not only black box tests, but any methods are easily possible

Since our pentester is not a member of our development teams and also works for other customers as a side job, his independence is still maintained.

ISO 27001 certified data center

If we host Just Social, we host your server system in a highly professional and ISO 27001-certified data center in Germany that meets the highest security standards:

  • Hosting in accordance with German data protection law
  • GDPR-compliant
  • Location of servers: Nürnberg
  • Location of servers: Nürnberg
  • Certified according to DIN ISO/IEC 27001
  • 24/7 video surveillance
  • Redundant power supply, network connection and climate control
  • 99.6% minimum availability
  • DDoS protection
  • Environmental protection: 100% electricity from renewable sources
  • Multiple awards

ISO certificate and further information about our data center

Technical

On premise or private cloud (enterprise version)

With the enterprise version of Just Social, you get your own “piece of software” over which you have complete control: You can either host it yourself in a data center of your choice (self-hosted), or let us host the entire hosting in our ISO-certified data center (private cloud). In any case, your data is in a secure location of your choice. Our standard processes for installing the private cloud include setting up a packet filter accordingly so that access from outside is only possible to the corresponding services, usually via SSH for maintenance (port 22) and HTTP/HTTPS (port 80/443). In addition, we have DDoS protection active.

Monitoring

If we take over the hosting of your Just Social system, we monitor the status of the services and resources used through a monitoring system. We are automatically notified when thresholds are exceeded. For example, we monitor:

  • Just Social Status (Heartbeat)
  • Heartbeat of the individual Just Social microservices
  • Backup Status
  • Hard disk usage
  • CPU usage
  • Memory usage (RAM)
  • Utilization of various queues and processes
  • Monitoring for anomalies and DDoS attacks
  • security updates

security updates

If we take over the hosting of your Just Social system, we install the latest security updates for the operating system on the server system every day.

backups

If we host your Just Social system, we back up the data daily and completely encrypted on a separate backup server.

Encrypted data transfer

Just Social transmits all data to the client in encrypted form via SSL or HTTPS (TLS), ensuring a high level of security. The algorithm used depends on the TLS key. This is usually AES with 256-bit key length. In addition to HTTPS, we use SSH for maintenance access.

password encryption

Users' passwords are secured using a bcrypt hash algorithm and a secret salt and stored in the database. Decryption is therefore not possible.

Minimum password requirements

Our minimum requirements for users' passwords ensure a high level of security: They require at least 8 characters, 1 letter and uppercase and lowercase letters, or 1 number or 1 special character.

Mandatory information

The following mandatory information is mandatory to use Just Social:

  • Name (first name, last name)
  • email address

All other details are optional.

Authentication/ Authorization

Every user interaction in JUST is subject to authentication and authorization verification. In the standard case, authentication is carried out using a user name and password. If SSO is configured, this check is carried out by connecting to your own Active Directory or a Microsoft AD FS/IDP server.

Chat messages

Chat messages are stored in the database. The chat does not save status changes (online/offline).

Audit security (enterprise version)

All information that is deleted by users in Just Social is initially only marked as deleted and is no longer displayed. As a result, the information is no longer visible to “normal” users in Just Social. At the database level, administrators can recover the information from the.

The final deletion of data is done automatically via a cron job. The frequency of the cron job (e.g. daily, monthly, yearly, every 5 or 10 years) can be adapted to the requirements of the respective customer.

Thanks to this two-stage deletion concept, Just Social is both audit-proof and compliant with data protection regulations.

IP addresses and server logs

IP addresses and server logs are only stored for a limited period of time. The exact time depends on log rotation (max 60 days). The logs store the following information:

  • IP address of the user
  • Operating system and browser type
  • date and time of access
  • Access methods, functions requested, amount of data transferred
  • Platform server access status
  • If applicable, the name of the requested file
  • If applicable, the URL from which the data was requested

cookies

Cookies are small text files that are stored in the user's browser and are used for various purposes. The cookies that Just Social creates and uses are described below.

Just Social recognizes the user from the following cookies: just-id, rememberMe and trusted-device.

  • just-id: Contains the user's internal ID encrypted on the server side and logs the user into Just Social. It is a session cookie (is deleted, for example, when the browser is closed (*)). In addition, this cookie is deleted when you unsubscribe from Just Social.
  • trusted-device: Contains the user's internal ID signed on the server side in plain text. The cookie is saved after a successful login. This enables the corresponding device to make login attempts even if the user's account is temporarily blocked due to too many failed previous login attempts. It is a long-lasting cookie (deleted after one month). This cookie is not deleted when you unsubscribe from Just Social.
  • RememberMe: Contains the user's email address signed on the server side in plain text. This cookie is created when the “Stay signed in” option is selected when logging in to Just Social. It is a long-lasting cookie (deleted after one year). This cookie is also deleted when you unsubscribe from Just Social.

In addition to the personal cookies mentioned above, other technical cookies are created:

  • jc_locale: Saves the user's language settings. It is a long-lasting cookie (deleted after one year).
  • loadproxy: With cluster systems, this is set so that the user always ends up on the same app server. It is a session cookie (is deleted, for example, when the browser is closed (*)).
  • XSRF TOKEN: A random value is stored here, which prevents so-called cross-site request forgery attacks. It is a session cookie (is deleted, for example, when the browser is closed (*)).
  • Optional: By integrating tracking tools such as Piwik/Matomo or Google Analytics, further cookies can be created. The integration of such tools is subject to the decision of the respective platform operator.

(*) If the browser's “restore last session” function is used when the browser is reopened, session cookies are also restored.

Cross-site scripting

Cross-site scripting is prevented by using our GWT framework and in the WYSIWYG editor via Antisamy.

SQL injection

The insertion of SQL queries is prevented by our use of prepared statements using mybatis, which is used for database access.

Mobile

Encrypted data transfer

Just Social transmits all data from all user devices to your server system in encrypted form via SSL or HTTPS (TLS), ensuring a high level of security.

Centralized data storage

Just Social basically stores all data centrally on your server system — so all knowledge is in a single, secure location. This also applies to data sent or received via our mobile apps.

Minimal data storage

In contrast to private chat tools such as WhatsApp or Threema, Just Social generally stores all data centrally on a server system of your choice (see above). Data is only stored temporarily and to the extent necessary for the apps to function on users' devices.

Any data may be stored exclusively in the protected app area, so that images and files are not displayed in the central image galleries and file storage areas of mobile phones.

MDM and EMM solutions

Just Social is compatible with all common Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions (e.g. MobileIron, Airwatch). These allow you, for example, to distribute and manage Just Social apps on users' smartphones or connect to the Just Social server system via VPN.

Remote logout

If you lose your mobile phone, you can log out remotely via your desktop PC on your mobile device to prevent unwanted access to your Just Social apps.

Fingerprint or code input (enterprise version)

The Just Social apps can optionally deny use on devices that do not have a device lock set up by fingerprint or code. In this case, not only the Just Social apps but the entire device are protected from unwanted access. In addition, the data is then securely encrypted by the mobile operating systems in the protected app area — this is only the case in the event of a device lock.

Authorization concept

Two-stage authorization concept

Just Social has a two-stage authorization concept:

  1. the central administration of the platform (e.g. to manage users or specify structures),
  2. as well as allows users to quickly and decentrally create and administer content such as news articles or chat groups.

Central administration of the platform

Super administrators can administer the entire Just Social system and, among other things, have access to all content and containers (with the exception of chats). They have global rights for all functions, e.g. they can:

  • View, create, edit, or delete all content (except chats they don't belong to)
  • Invite, block, deactivate, delete users
  • Change user profiles and passwords
  • Change design such as colors and logo
  • Use system functions, such as reindexing searches
  • ...

Decentralized administration of content

In order to meet the various requirements and at the same time ensure ease of use, Just Social consists of several apps, each specialized in a specific use case. In each of our apps, a central element (“container”) can be created, for which the respective creator of the container can grant permissions to read, write and manage:

  • News app: news channels
  • Wiki app: Wikis
  • Drive app: drives
  • Connect app: Chats
  • People app: groups

App writer have permission within an app to create new containers, such as new drives, news channels or wikis.

container admins have read, write and manage rights within a container (e.g. drive, wiki, news channel), so that they can, for example, within a drive:

  • View and download files.
  • You can change (e.g. delete or upload) files.
  • can change the permissions of the drive (e.g. add or delete users).

container writer have read and write rights within a content container (e.g. drive, wiki, news channel)

so that they can, for example, within a drive:

  • View and download files.
  • You can change (e.g. delete or upload) files.

container reader have read rights within a content container (e.g. drive, wiki, news channel), so that they can, for example, within a drive:

  • View and download files.

Emergency and restart concept

In an emergency, the monitoring tool informs Just Software's support team that the customer's server is not available. The support team may handle the emergency in the following steps:

  • The support team reviews and investigates the emergency
  • The support team informs the customer about the nature of the incident and its extent via a ticket system or email
  • The support team restores the customer's Just Social system and takes the necessary steps (depending on the type of incident) (e.g. replacement of hardware, importing backups).
  • If necessary or useful, this is done in consultation with the customer
  • As soon as the customer's Just Social system is restored, the support team checks the functionality of the system using the monitoring tool (e.g. Heartbeat)
  • After a successful check, the support team informs the customer that the Just Social system is available again
  • Where relevant, the support team creates an internal ticket including documentation and measures for further implementation to prevent similar incidents from the outset in the future.

The concepts for all Just servers and internal systems are regularly checked and audited.

For banks: Impact analysis in accordance with MaRisk AT 8.2

The AT 8.2 MaRisk standard states that before significant changes in the IT organization, the effects of

The planned changes must be reviewed:

“Before significant changes in the organizational and operational structure as well as in the IT systems, the institute must analyse the effects of the planned changes on control procedures and control intensity. ”

Since Just Software operates the Just Social system for the customer as a software-as-a-service (SaaS) in a private cloud, however, there are hardly any points of contact with the customer's IT (with the exception of user import). Therefore, a non-significant change in the customer's IT organization can be assumed, so that a detailed analysis can be dispensed with.

IT system architecture

Just Social System Requirements