Title
Text
Back

Data Structure Overview

This table describes all types of data handled by our solution, their sources, storage locations, encryption methods, and access permission.

Organization data is encrypted using a shared, account-level key—except when the account is created for a single user. In that case, the data is encrypted with that individual user's key.
Data Type Source Encryption Key User Account Admin Manager Project Manager Nicely
User Profile User Input Account Master Key (AES-256)
Calendar Events Google / Microsoft User Personal Key
Call History Aircall / Vonage / Keyyo User Personal Key
Activities Assistants / User User Personal Key
Project Data Jira / Monday / Configuration Organization encryption key
Customer Data Pennylane / Axonaut / Configuration Organization encryption key
Reports Output Organization encryption key * * *
Financial Data Configuration / Output Restricted encryption key ** **
Session Data System Generated System Master Key
Activity Logs System Generated Log Encryption Key (AES-256)
Tasks User Input Organization encryption key
* According to the scope of the access ** Requires additional access permissions