Data Structure Overview
This table describes all types of data handled by our solution, their sources, storage locations, encryption methods, and access permission.
| Data Type | Source | Encryption Key | User | Account Admin | Manager | Project Manager | Nicely |
|---|---|---|---|---|---|---|---|
| Calendar Events | Google / Microsoft | User Personal Key | ✓ | ||||
| Call History | Aircall / Vonage / Keyyo | User Personal Key | ✓ | ||||
| Activities | Assistants / User | User Personal Key | ✓ | ||||
| Project Data | Jira / Monday / Configuration | Organization encryption key | ✓ | ✓ | ✓ | ✓ | |
| Customer Data | Pennylane / Axonaut / Configuration | Organization encryption key | ✓ | ✓ | ✓ | ✓ | |
| Reports | Output | Organization encryption key | ✓ * | ✓ * | ✓ * | ||
| Financial Data | Configuration / Output | Restricted encryption key | ✓ ** | ✓ ** | |||
| Session Data | System Generated | System Master Key | ✓ | ||||
| Tasks | User Input | Organization encryption key | ✓ | ✓ | ✓ |