Microsoft 365 Sync
Overview
The Microsoft 365 Sync App enables bidirectional synchronization of events between Microsoft Calendar and FlowAgent.
Prerequisite
Before individual users can synchronize their calendars, the Microsoft 365 Sync App must be installed by an administrator or user with necessary permissions. Refer to the installation guide for detailed instructions.
User Setup
Follow the steps below to synchronize your Microsoft Calendar with FlowAgent:
Step 1: Access Account Settings
Navigate to Account Settings through the top navigation bar.
Step 2: Connect to Microsoft
In the General tab, click on Connect to Microsoft.
Step 3: Approve the Connection
Log into your Microsoft account and approve the connection to complete the integration.
Integration with FlowAgent Apps
Once the sync is set up, events can be displayed and managed in compatible FlowAgent apps, such as the calendar app.
Security and Data Handling Document
1. Data Collection
- Users connect to Office 365 via Microsoft Login, where FlowAgent is a verified publisher.
- User permissions are clearly outlined by Microsoft, without the option for custom selection.
- Organization approval is required before user acceptance.
- Upon acceptance, Microsoft generates an authorized access key for data retrieval.
2. Data Processing
- Calendar events from O365 are matched, updated, or newly created in FlowAgent.
- Data is encrypted before storage and never stored in decrypted form.
- Unique IDs from Microsoft ensure the identification and update of synchronized data.
3. Data Storage
- Synced data is stored in a Denmark-based database with restricted access.
- Compliance with GDPR and other data protection regulations is ensured.
4. Data Distribution and Security
- Encryption in Transit: Data from O365 is encrypted using SSL/TLS protocols.
- Data Encryption: AES (Advanced Encryption Standard) is used for database storage.
- Access Control: Strictly controlled and limited to authorized users.
- Regular Security Audits: Conducted to identify and mitigate potential threats.
5. Compliance and Data Protection
- Adherence to GDPR and other data protection laws.
- Involvement of CISO and IT security in formalizing security measures and protocols.