Security

We take security very seriously. This means ensuring we keep all of your personal data safe. The information on your calendar contains sensitive information that must be protected at all costs. Therefore, we have added multiple layers of industry-approved security technology and adhere to industry best practices. This focus is an extension of our privacy policy that recognizes the importance of respecting your need for privacy.

Contact Security

However, our security features also extend to your contact information. Your contacts also have personal information that they do not want to have stolen through a data breach. Not only do we maintain multiple security technology to keep this information from vulnerabilities.But, we also do not share any of the data or spam them. No third-party services or users can access your contact list.

Email Security

We ask for your email to determine what contacts are important to you as part of your calendar and scheduling. We also want to maintain contact with you and share valuable information.For security purposes, we only store certain information related to your email. Stored information only includes the To, From, and Data email fields. Hence, no information from the main email text is stored on our servers. Additionally, content from your messages is redacted to the back-end of our system. That means is it only visible to you.

Calendar Security

We have access to your calendar because this provides us with a way for others to schedule a calendar meeting with you. This also enables our machine learning capability to make suggestions that help you prepare for meetings, attend events and over time become much more productive.However, encrypting meeting titles and descriptions protects this information. Additionally, data storage and transmission uses encryption. As a result, you are the only person who can view your meeting agendas.

Technology

  • 256-AES encryption protects all stored data.
  • 128-bit SSL encryption protects all transmitted data.
  • Administrative access is done using secure remote access technologies like VPN and SSH.

Best Practices

  • We conduct regular security audits with a third-party white-hat provider to ensure we have the most current technology and best practices in place. The audit includes vulnerability scanning, penetration tests, and system tests.
  • Because we take it seriously, we run background checks on anyone that works with our company either on-site or remotely.
  • We monitor database access for suspicious activity.
  • We use off-site, geographically distributed backup systems to keep your data safe.
  • Our infrastructure includes AWS components with uptime SLAs of 99.95% and 24/7 monitoring.
  • We have an expert IT support team prepared to solve any issues.

Do You Have Security Concerns? We’ve Got Answers

Contact us at [email protected]  for more information.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.
AcceptRead Here