
To support your efforts in addressing DORA requirements, we have created this resource which provides both practical information and references to our established documentation that applies to your DORA-related commitments.
The key pillars of DORA are addressed through the following measures which include security features of our SaaS application and operational security measures we take as a company, and help you with your DORA compliance efforts.
Data security and privacy obligations are addressed in our Data Processing Addendum (DPA). For a full overview of monday.com’s security and privacy practices, please refer to the monday.com White Paper, available at our Trust Center.As part of the platform and offerings, we offer various governance features for companies to have full abilities to own and manage their data. Amongst that, we offer logging tools on the item, board, and account level. These logs can be exported and integrated into your existing monitoring tools.
Admins can set up account restrictions such as IP restrictions, and customize user management and permissions. Take control of Access Control for your monday.com instance by integrating with your IdP for SSO and setting up 2FA .monday.com is the data processor (or service provider) of personal data that its customers and users submit to the platform (into their boards and items within their monday.com account), and processes this data solely on its customers’, the data controller (or business) behalf.
monday.com customers retain full control of their uploaded data and may modify, delete or export it at all times using the means available through the service's user interface. Upon termination of the contract, customers can request deletion of their data as part of the account closure procedure. All customer data will then be deleted within 90 days, which includes a 30-day period to allow for rollback, and additional 60 days to delete the data from our databases and our sub-processors databases.When implementing a third party solution, security measures are taken in order to ensure that the third party does not negatively impact monday.com’s risk level. For this purpose, we hold our third parties to industry standards with respect to data security and privacy and consider both areas as critical in our vendor selection process.
Among others, we have ensured that Data Processing Addendums (DPAs) and other relevant documentation are in place with all of our sub-processors which contain the same or materially similar data protection obligations as set out in the customer DPA. We perform privacy and security assessments and questionnaire-based audits, review SOC reports and PT executive summaries if applicable.monday.com takes part in and subscribes to professional forums, groups, conferences, etc. to receive automated intelligence feeds on threats, and vulnerabilities, and compromised companies in the industry.
The company has automation tools that scan for the existence of these threats and assess their impact and relevance to us. The areas we monitor for threat intelligence include our endpoints, IT systems environment, and vulnerabilities within our cloud infrastructure, as well as compromised companies.