Technical Information on Data Processing

In corporate environments, it is important to know when software connects to the Internet and what data is exchanged in the process. In this chapter, we describe these situations in detail. Naturally, this chapter contains technical terminology. Please also refer to our Glossary if needed.

If you are interested in the non-technical aspects of data protection, please refer to our Privacy Policy.

Data Transmission on Program Start and Login

 

Data Transmission While Using Citavi

Data Transmission in Case of Program Errors

To improve Citavi and resolve program errors, we use the Application Insights service from Microsoft Azure.

If the program's product development mode is enabled, program errors including the context and sequence of the error are transmitted. As a rule, only the name of the Citavi function that was called is transmitted. However, it is possible that a user name may be included: "Access to file C:\Users\thomas.schempp\Documents\Citavi 6\... failed." Sensitive information such as passwords is never transmitted.

This data is only transmitted if the user activates this option under Tools > Options > Diagnostics or Tools > Options > Product development. A system administrator can disable these options using the MSI Assistant.

Errors are always logged if they occur within our cloud infrastructure. They never contain personal data.

Additional Data Transmissions

Any further network access depends on where the Citavi project is stored:

Local Projects

The Citavi project is stored on a computer, an external hard drive, or in a local network. In this case, there are no additional data transmissions.

DBServer Projects

The Citavi project is stored in a Microsoft SQL database.

Cloud Projects

The Citavi project is stored in the Citavi Cloud, which uses Microsoft Azure. Microsoft operates many data centers around the globe. For users in Europe, we use data centers in Western Europe (Azure WestEurope in Dublin and Amsterdam) for account data and Citavi projects. Users in America are served from data centers in the United States (Azure US Central), and in Asia, from a data center in Singapore (Azure Southeast Asia).

Citavi continuously communicates with the WebAPI.

Additional Information

Citavi for DBServer

Connection

Citavi uses the standard .NET libraries (System.Data.SqlClient) to connect to the SQL Server. All communication between Citavi and the database server is based on this framework and follows the protocols established and proven by Microsoft.

DBServer Manager

DBServer Manager is not a server application and does not communicate with Citavi. DBServer Manager is a frontend that sends SQL statements to the selected SQL Server — in other words, a "Management Studio light" for Citavi purposes. Since DBServer Manager is not a server application, it is not a critical component in terms of security.

Project/Data Security

Security at the database/project level is enforced using standard SQL Server mechanisms (i.e., not Citavi-specific methods).

Each project is represented as a schema on the SQL Server. For each schema, there are three roles: Managers, Authors, and Readers. Authors have insert/update/delete permissions, while Readers only have select permissions. (Managers additionally have the right to change role memberships.)

When a user is granted author rights in DBServer Manager, this means — technically speaking — that the user is added via SQL to the “Authors” role of the corresponding project schema. This architecture ensures that even if a user accesses the SQL Server database using a client other than Citavi, they can only view data that they would also be able to access in Citavi.

Cloud

We use Microsoft Azure’s cloud services for our web services. Our servers are operated as so-called WebApps (Platform-as-a-Service). This means that Microsoft ensures the security of these systems on multiple levels.

Communication

All communication with our servers is always encrypted (HTTPS / TLS).

Project Database

Cloud projects are stored in a SQL Azure database. We implement various safeguards in our code and on the database level to ensure that users can never see “foreign” project data — even if one of our developers were to accidentally write an incorrect SQL query.

SQL Azure mirrors all data across three instances simultaneously, so that no data is lost in the event of a hardware failure. SQL Azure creates automatic backups every few minutes and retains them for the past 7 days. In the rare case that an entire data center fails, the data is continuously copied to another data center.

SQL Azure data is encrypted at the physical level, making it inaccessible to any external attacker who might gain access to the database storage systems. For Swiss Academic Software itself, the data is not encrypted — this is technically unavoidable. Because administrative access to the production environment implies access to Citavi project data and user attachments, we have strictly limited this access to very few individuals. These individuals are obligated not to view any user data.

Client (Desktop Application)

The Citavi desktop application does not provide any server services and therefore cannot be externally attacked. In this sense, it is not considered critical from a security perspective.

When Citavi stores security-relevant information (e.g., in the case of an access token), we use strong public/private key encryption.