Priority Matrix

Click here for more information on the Microsoft Certified app program.

Last updated by the developer on: June 23, 2021

General information

Information provided by Appfluence Inc to Microsoft:

Information Response
App name Priority Matrix
ID appfluenceinc.m_pm_msft
Partner company name Appfluence Inc
URL of partner website https://appfluence.com/office-365-project-management-integr...
URL of Privacy Policy https://appfluence.com/privacy
URL of Terms of Use https://appfluence.com/eula

Feedback

Questions or updates to any of the information you see here? Contact us!

How the app handles data

This information has been provided by Appfluence Inc about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.

Data access using Microsoft Graph

List any Microsoft Graph permissions this app requires.

Permission Type of permission (Delegated/ Application) Is data collected? Justification for collecting it? Is data stored? Justification for storing it? Azure AD App ID
Calendars.Read delegated Only when a new user is added to the account, do we store their email. On new account creation, we use this to suggest other team members. 5be2b320-a5b7-4221-893c-dee506e4e365
User.ReadBasic.All delegated Only when a new user is added to the account, do we store their email. On new account creation, we use this to suggest other team members. 5be2b320-a5b7-4221-893c-dee506e4e365
offline_access delegated We store the login token in order to perform requests on behalf of the user Refresh token without bothering the user. (Priority Matrix for Teams) 5be2b320-a5b7-4221-893c-dee506e4e365
Files.Read.All delegated We do not store any file information, unless the user explicitly and knowingly creates a Priority Matrix item that links to the original file. In our One-on-One feature (available via our web app and also our Outlook/Teams add-ins), we use this feature to highlight SharePoint/OneDrive files that are shared between two users in our system, as a way to facilitate meetings and overall collaboration. affadfb6-f17b-428f-97f9-9aae3b6175bc
User.Read delegated Basic user profile information (display name, first name, last name, email, avatar) is stored by us. Get the user's name, email, avatar, to personalize their account with us. affadfb6-f17b-428f-97f9-9aae3b6175bc
openid delegated We store the SSO connection to indicate the login mode for the user. In order to sign in users via single-sign-on. affadfb6-f17b-428f-97f9-9aae3b6175bc
Calendars.Read delegated A small number of calendar events are turned into tasks stored in our system. Read calendar events so they can be displayed in our 1:1 view. Also to initialize new accounts. d76f016f-52c7-41b5-835b-900361d7040c
Mail.Read delegated We store tasks created in our system, with a link to the original message. Used in our Outlook add-in to turn emails into tasks, and to display shared work in 1:1 view. d76f016f-52c7-41b5-835b-900361d7040c
Tasks.Read delegated Some Outlook/Planner tasks are replicated in our system to help new users. We bootstrap new user accounts with their Graph tasks. d76f016f-52c7-41b5-835b-900361d7040c

Non-Microsoft services used

If the app transfers or shares organizational data with non-Microsoft service, list the non-Microsoft service the app uses, what data is transferred, and include a justification for why the app needs to transfer this information.

Non-Microsoft services are not used.

Telemetry data

Does any organizational identifiable information (OII) or end-user identifiable information (EUII) appear in this application's telemetry or logs? If yes, describe what data is stored and what are the retention and removal policies?

Yes, we use the user's email as their unique ID in our system, and that is used to trace application errors, and to track key events in the system (downloads, sign ins, application versions, etc) so that our customer service team can provide a prompt response to customer queries. As part of our GDPR compliance, we delete all customer data within 2 weeks of a deletion request, although in practice we do this on the same day, as we have internal scripts to do this in a semi-automatic way.

Organizational controls for data stored by partner

Describe how organization's administrators can control their information in partner systems? e.g. deletion, retention, auditing, archiving, end-user policy, etc.

Application data is stored securely in an encrypted database with access limited to a small group of admins. In order to further secure access, we enforce 2-factor authentication, limit access to a controlled set of IP addresses, and locate the database in its own private subnet, directly inaccessible from the open internet.

Human review of organizational information

Are humans involved in reviewing or analyzing any organizational identifiable information (OII) data that is collected or stored by this app?

No

Feedback

Questions or updates to any of the information you see here? Contact us!

Information from the Microsoft Cloud App Security catalog appears below.

View in a new tab

Feedback

Questions or updates to any of the information you see here? Contact us!

Identity information

This information has been provided by Appfluence Inc about how this app handles authentication, authorization, application registration best practices, and other Identity criteria.

Information Response
Do you integrate with Microsoft Identify Platform (Azure AD)? Yes
Have you reviewed and complied with all applicable best practices outlined in the Microsoft identity platform integration checklist? Yes
Does your app use MSAL (Microsoft Authentication Library) for authentication? No
Does your app support Conditional Access policies? No
Does your app request least privilege permissions for your scenario? Yes
Does your app's statically registered permissions accurately reflect the permissions your app will request dynamically and incrementally? Yes
Does your app support multi-tenancy? Yes
Does your app have a confidential client? Yes
Do you own all of the redirect Unified Resource Identifier (URI) registered for your app? Yes
For your app, what do you avoid using? - Wildcard redirect URIs,

- Resource Owner Password Credential (ROPC) flow
Does your app expose any web APIs? Yes
Does your permission model only allow calls to succeed if the client app receives the proper consent? Yes
Does your app use preview APIs? No
Does your app use deprecated APIs? No

Feedback

Questions or updates to any of the information you see here? Contact us!