zAgile Privacy Statement

zAgile Inc. (“zAgile”, “we”, “our”, “company”) is committed to protecting the privacy of individuals who visit the company’s website (, individuals who register for various marketing campaigns and surveys sponsored by zAgile related to its products and services, individuals who register their interest in zAgile’s product and services at various application marketplaces, via email or other direct exchange with zAgile, and individuals and organizations to whom zAgile provides products and services. This Privacy Statement describes our practices regarding the collection and use of information from various aforementioned sources.

For any questions or complaints related to this statement or our practices related to the handling of such information, please email them to

The Information We Collect
Website - We do not currently collect any Personal Information from users of our products and services via forms. In addition, we do not currently use cookies to track user engagement on the website. While we use various site analytics tools to capture site visits and related statistics, we do not deploy any tools to identify specific users. We use the data related to website visits primarily for marketing purposes to determine effectiveness of various marketing campaigns and improve website content and usability.

Partner Marketplaces – We offer our various products and services in application marketplaces hosted by our partners (Salesforce, Atlassian, Slack, etc.). Our partners may provide us with registration data submitted by individuals, as well as the activity of the individuals pertaining to their interest in our products and services, including but not limited to, access of various resources (product demos, datasheets, videos, test drives, installs, etc.). This registration data typically consists of a user’s Name, Email Address, Company, Title, Phone, and other business contact information (collectively, “Personal Information”).

We use the Personal Information we receive from our partners solely for marketing and sales outreach. zAgile does not share information with any third-party except to the limited extent that such third-party requires such information in order to provide specific services to zAgile in support of zAgile’s sales and support operations (see Third Party Services below).

CRM System — From our customers and clients, we collect information (collectively, “Customer Information”) generally associated with Sales, Order Processing, Legal Contract Reviews, and Accounts Receivable, including, but not limited to:

  • Business entity (Name, Address, Phone)
  • Business and Technical Contacts (Name, Phone, Email)
  • Accounting (A/P) contacts (Name, Email)
  • Specific legal terms agreed upon between company and zAgile

This information is solely used for the purpose of conducting the business transaction, as well as in support-related matters.

Third Party Services
In the course of a business transaction, as well as to facilitate our Sales and Marketing efforts, we may engage specific third-party services. In each of these scenarios, the privacy policies associated with the third-party will apply.

Such services include:

  • Credit Card and ACH processing of payments made by zAgile customers directly via these services
  • Email marketing campaigns for zAgile’s product announcements, webinars, etc
  • Sales, Customer Relationship and Customer Support management
    Conducting web meetings and webinars
    Email exchange with customers and prospects

We limit the information shared with the providers of these services to that which is reasonably necessary for them to perform their functions, and our contracts with them require them to maintain the confidentiality of such information.

Communications with Customers and Prospects
We routinely receive information from our customers and prospects pertaining to the functionality and use of our software and any specific issues that they may experience. This may include log files, screenshots, and any other investigative data that they may share with us towards the resolution of specific queries and problems.

We also receive software exception emails in scenarios where certain system or application errors occurred during the execution of transactions involving our software. These exceptions do not contain any user Personal Information and mostly focus on the operation being performed and the area of code where the problem occurred.

This information is used solely for the purpose of Customer Support-related activities, as well as ongoing product quality improvement efforts.

zAgile Application Component Hosting
zAgile may host certain components of its zAgile Software (as such term is defined in the Subscription Services Agreement). For this hosting, we specifically leverage services provided by the Salesforce Heroku platform. Heroku manages its own security and privacy policies pertaining to its platform and related services.

Within the context of the zAgile Software, the component facilitates exchange between applications that it integrates. For example, zAgileConnect Jira Cloud Add-on, hosted by zAgile, integrates Salesforce and Jira Cloud applications. zAgile’s Chat:Bridge software, with its Slack App hosted also on the Heroku platform, integrates Salesforce and Slack. Furthermore, each hosted component provides the integration in a multi-tenant environment, i.e. a single instance that is used by multiple customers.

In this component, we store the following:

  • ID and URL of application instance pair that is being integrated
  • Authentication parameters (tokens) that are used for the hosted component to authenticate to each applications
  • Field configuration metadata that is being shared across applications
  • Other General configuration settings, such as date format, max attachment size, email for alert notification).

In temporary database, we also store specific application events (example: ID of any Jira Issue that was updated or deleted). This data is removed once it is successfully delivered to the corresponding customer application instance for which it was intended.

All of this data is removed when zAgile’s software is uninstalled.

Application Logging and Monitoring
We capture transaction and monitoring logs that may contain timestamp, user name, and resource being accessed. These logs are stored for 2 weeks and discarded. These logs are used solely for the purpose of ensuring the health of the zAgile Software components, as well as, for any needed technical investigations.

Change of Ownership
Information about users, including Personal Information, may be disclosed and otherwise transferred to an acquirer, successor or assignee as part of any merger, acquisition, debt financing, sale of assets, or similar transaction, as well as in the event of an insolvency, bankruptcy, or receivership in which information is transferred to one or more third parties as one of our business assets and only if the recipient of such information commits to a Privacy Policy that has terms substantially consistent with this Privacy Policy.

Customer Information may be physically or electronically transferred to an acquirer, or successor or assignee as part of any merger, acquisition, debt financing, sale of assets, or similar transaction, as well as in the event of an insolvency, bankruptcy, or receivership in which information is transferred to one or more third parties as one of our business assets, for the sole purpose of continuing the operation of the Service, and only if the recipient of the Customer Information commits to a Privacy Policy that has terms substantially consistent with this Privacy Policy.

Your California Privacy Rights
We will not share any Personal Information with third-parties for their direct marketing purposes to the extent prohibited by California law. If our practices changes, we will do so in accordance with applicable laws and will notify you in advance.

Do Not Track Policy
California law requires that operators of websites and online services disclose how they respond to a Do Not Track signal. Some browsers have incorporated “Do Not Track” features. Most of these features, when turned on, send a signal or preference to the website or online service that a user visits, indicating that the user does not wish to be tracked. Because there is not yet a common understanding of how to interpret Do Not Track signals, we do not currently respond to Do Not Track signal. We continue to work with the online industry to define a common understanding of how to treat Do Not Track signals.

In the meantime, you may opt out of receiving interest based advertising from advertising networks that may be delivered on our platform and other websites by visiting the following websites. If you want to opt out of this online behavioral advertising, visit the following sites: and
This will opt you out of many –but not all- of the interest-based advertising activities in which we or third parties engage. Choices you make may be browser and device specific. If you delete your cookies or use a different browser or a different computer or device, you may need to update your opt-out choices. Other third-party Sites provide visitors with the ability to opt-out of receiving interest-based ads on their Sites that you need to control through your settings on that Site. For example, to opt out of Google’s use of your online behavior for advertising purposes, visit Google’s Ad Settings page.

Third Party Cookies
California law requires that operators of websites and online services disclose whether other third parties may collect personally identifiable information about an individual's online activities from their site or service. We do not use cookies.

Minors and Children’s Privacy
Protecting the privacy of young children is especially important. Our software is not directed to children under the age of 18, and we do not knowingly collect Personal Information from children under the age of 18 without obtaining parental consent. If you are under 18 years of age, then please do not use or access our software at any time or in any manner. If we learn that Personal Information has been collected on the software from persons under 18 years of age and without verifiable parental consent, then we will take the appropriate steps to delete this information. If you are a parent or guardian and discover that your child under 18 years of age has used our software, then you may alert us at and request that we delete that child’s Personal Information from our systems.
Our software is not intended to be used by minors, and is not intended to be used to post content to share publicly or with friends. If you have any question regarding this topic, please contact us as indicated in the “How to Contact Us” section. Please be aware that, although we offer this deletion capability, the removal of content may not ensure complete or comprehensive removal of that content or information.

Data Security
We follow generally accepted industry standards to protect the information submitted to us, both during transmission and once we receive it. We maintain appropriate administrative, technical and physical safeguards to protect Personal Information against accidental or unlawful destruction, accidental loss, unauthorized alteration, unauthorized disclosure or access, misuse, and any other unlawful form of processing of the Personal Information in our possession. This includes, for example, firewalls, password protection and other access and authentication controls. We use SSL technology to encrypt data during transmission through public internet, and we also employ application-layer security features to further anonymize Personal Information.

However, no method of transmission over the Internet, or method of electronic storage, is 100% secure. We cannot ensure or warrant the security of any information you transmit to us or store on the software, and you do so at your own risk. We also cannot guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards. If you believe your Personal Information has been compromised, please contact us as set forth in the “How to Contact Us” section.

If we learn of a security systems breach, we will inform you of the occurrence of the breach in accordance with applicable law.

Data Retention
We only retain the Personal Information collected from a customer for as long as the User’s account is active or otherwise for a limited period of time as long as we need it to fulfill the purposes for which we have initially collected it, unless otherwise required by law. We will retain and use information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements:

Privacy Settings
Although we may allow you to adjust your privacy settings to limit access to certain Personal Information, please be aware that no security measures are perfect or impenetrable. We are not responsible for circumvention of any privacy settings or security measures with respect to the software. Additionally, we cannot control the actions of other users with whom you may choose to share your information. Further, even after information is removed, caching and archiving services may have saved that information, and other users or third parties may have copied or stored the information available on the software. We cannot and do not guarantee that information you post on or transmit through the software will not be viewed by unauthorized persons.

Data Transfer
We may transfer, process and store Personal Information we collect through the Services in centralized databases located in the U.S. The U.S. may not have the same data protection framework as the country from which you may be using the Services. When we transfer Personal Information to the U.S., we will protect it as described in this Privacy Policy.

Changes and Updates to this Policy
Please revisit this page periodically to stay aware of any changes to this Policy, which we may update from time to time. If we modify the Policy, we will indicate the date of the latest revision, and will comply with applicable law. Your continued use of the zAgile Software after the revised Policy has become effective indicates that you have read, understood and agreed to the current version of the Policy.

Our Contact Information
Please contact us with any questions or comments about this Policy, your Personal Information, our use and disclosure practices, or your consent choices by email at

Close Menu