Learn

Publisher Attestation: The information on this page is based on a self-assessment report provided by the app developer on the security, compliance, and data handling practices followed by this app. Microsoft makes no guarantees regarding the accuracy of the information.

Last updated by the developer on: March 23, 2020

General information

Information provided by Witivio to Microsoft:

Information Response
App name Learn
ID 2d96b540-aa26-431b-bc31-222321c762e3
Capabilities Bot, Tab
Office 365 clients supported Microsoft Teams
Partner company name Witivio
Physical address 16A rue de selestat 68000 COLMAR, FRANCE
URL of partner website https://www.witivio.com/learn
URL of Privacy Policy https://www.witivio.com/en/privacy
URL of Terms of Use https://witivio.com/en/terms-of-use
Main telephone number +337 88 75 53 19
Description of available licensing options, if any Light version in the store + subscription for premium contents
Licensing contact contact@witivio.com
Licensing telephone number +337 88 75 53 19

Feedback

Questions or updates to any of the information you see here? Contact us!

How the app handles data

Information provided by Witivio on how this app collects and stores organizational data, and what control an organization has over this data.

Data access using Microsoft Graph

List any Microsoft Graph permissions this app requires, and for each, whether they are delegate or application permissions, the justification and purpose for this permission (what does the app use this information for?), and whether the app stores any of this information in its databases.

Permission Delegated/Application Justification/Purpose Is any of this data stored in app database(s)? Azure AD App ID
User.Read Delegated We collect the UPN and the AAD ID for the authorization. N/A 8c5c0060-2892-4355-b0db-661f206028a9
User.ReadBasic.All Delegated We collect the UPN and the AAD ID for the authorization. N/A 8c5c0060-2892-4355-b0db-661f206028a9
openid Delegated We collect the UPN and the AAD ID for the authorization. N/A 8c5c0060-2892-4355-b0db-661f206028a9
profile Delegated We collect the UPN and the AAD ID for the authorization. N/A 8c5c0060-2892-4355-b0db-661f206028a9

Non-Microsoft Services Used

If the app transfers or shares organizational data with non-Microsoft service(s), list the non-Microsoft service(s) the app uses, what data is transferred, and include a justification for why the app needs to transfer this information.

N/A

Data access via bots

If this app contains a bot or a messaging extension, it can access the roster (first name, last name, display name, email address) of any team member in a team or chat it's added to. Does this app make use of this capability?

Access team/chat roster? Justification/Purpose Is any of this data stored in app database(s)?
Yes We use the roster for: 1) authorization (grant access to the bot), 2) detect the firstname to provide a friendly UX, 3) To manage the chatlogs for the business admin of the bot N/A. Or bots is only personal

Telemetry data

Does any organizational information, including EUII (end-user identifiable information) and OII (organizational identifiable information), appears in this application's telemetry/logs? If yes, describe what data is present and what controls/processes an organization has in place to archive and/or delete it. If no, describe the controls/processes in place to prevent EUII and OII from appearing in telemetry/logs.

The telemetry of the bot contains the UPN and the AAD ID fr diagnostics. Only PROD/Run administrators has access to the production telemetry. The logs are stored for 90 days and can be deleted on request on a dedicated portal support.witivio.com or by email to dpo@witivio.com

Storing and securing organizational data

Describe where/how is this application's data is stored and how access to it is controlled. Is it encrypted? Who can access it? How do you ensure that only authorized systems/individuals can access it? Examples: 2FA for all admins, Privileged Access Management (PMA), partitioning service admin accounts from Azure AD/corporate user accounts, protected IP ranges between systems, etc.

Using the Witivio backoffice, they can:

  • delete all history
  • enable anonymisation
  • review the chatlogs
  • Set data protection policy message in the first conversation of the bot

Organizational controls for data stored by partner

Describe any capabilities an organization's administrators have to control their information residing in partner systems, e.g. deletion, retention, auditing, archiving, end-user policy, etc.

Witivio only uses Azure components, deployed in the north Europe region. We use application insight and Cosmos DB for data analytics and storage.. Witivio use MFA for all users, including admins. Admins have a user account (for workstation) and a privileged account for accessing Azure ressources.

Human review of organizational information

Are humans involved in reviewing or analyzing any organizational data that is collected or stored by this app?

Yes

Feedback

Questions or updates to any of the information you see here? Contact us!

Information from the Microsoft Cloud App Security catalog appears below.

Note

The information on this page is based on a self-attestation report provided by the app developer on the security, compliance and data handling practices followed by the app. Microsoft makes no guarantees regarding the accuracy of the information. Contact us if you believe information about an app is outdated.

View in a new tab

Feedback

Questions or updates to any of the information you see here? Contact us!