Contact Security
However, our security features also extend to your contact information. Your contacts also have personal information that they do not want to have stolen through a data breach. Not only do we maintain multiple security technology to keep this information from vulnerabilities.But, we also do not share any of the data or spam them. No third-party services or users can access your contact list.Email Security
We ask for your email to determine what contacts are important to you as part of your calendar and scheduling. We also want to maintain contact with you and share valuable information.For security purposes, we only store certain information related to your email. Stored information only includes the To, From, and Data email fields. Hence, no information from the main email text is stored on our servers. Additionally, content from your messages is redacted to the back-end of our system. That means is it only visible to you.Calendar Security
We have access to your calendar because this provides us with a way for others to schedule a calendar meeting with you. This also enables our machine learning capability to make suggestions that help you prepare for meetings, attend events and over time become much more productive.However, encrypting meeting titles and descriptions protects this information. Additionally, data storage and transmission uses encryption. As a result, you are the only person who can view your meeting agendas.