Security & Data Protection

Your data security is our top priority

Last Updated: December 11, 2025

At My Schedule App, we take security seriously. We implement industry-leading security measures to protect your data and ensure the confidentiality, integrity, and availability of our service. This page outlines our comprehensive security practices and commitments.

1. Data Encryption

All data transmitted to and from My Schedule App is protected using enterprise-grade encryption:

  • TLS 1.3 encryption for all data in transit between your devices and our servers
  • AES-256 encryption for all sensitive data at rest in our databases
  • Encrypted backups with separate encryption keys
  • End-to-end encryption for sensitive employee information

2. Infrastructure Security

Our infrastructure is built on industry-leading cloud providers with multiple layers of security:

  • Hosted on secure, SOC 2 Type II certified data centers
  • Redundant infrastructure across multiple availability zones
  • Network isolation and firewalls to prevent unauthorized access
  • Regular security patches and system updates

3. Authentication & Access Control

We implement strict authentication and access control measures:

  • Strong password requirements with complexity enforcement
  • Multi-factor authentication (MFA) available for all accounts
  • Role-based access control (RBAC) for fine-grained permissions
  • Session management with automatic timeout
  • IP whitelisting options for enterprise customers

4. Data Privacy

We are committed to protecting your privacy and complying with data protection regulations:

  • GDPR compliance for European customers
  • Data minimization - we only collect what's necessary
  • Clear data retention policies
  • Right to access, export, and delete your data at any time

5. Application Security

Our application is built with security best practices at every level:

  • Secure coding practices following OWASP guidelines
  • Protection against SQL injection, XSS, and CSRF attacks
  • Input validation and sanitization on all user inputs
  • Rate limiting to prevent abuse and DDoS attacks
  • Regular security audits and penetration testing

6. Monitoring & Incident Response

We maintain 24/7 monitoring and have comprehensive incident response procedures:

  • Real-time monitoring of system health and security events
  • Automated alerts for suspicious activity
  • Incident response team ready to respond to security incidents
  • Regular security incident drills and training

7. Backup & Disaster Recovery

Your data is protected with comprehensive backup and disaster recovery procedures:

  • Automated daily backups with point-in-time recovery
  • Geographically distributed backup storage
  • Regular backup restoration testing
  • Business continuity plan with RTO and RPO guarantees

8. Compliance & Certifications

We maintain compliance with industry standards and regulations:

  • GDPR (General Data Protection Regulation) compliant
  • SOC 2 Type II certification (in progress)
  • Regular third-party security audits
  • Compliance with local labor and data protection laws

9. Employee Security

Our team members are trained and vetted to maintain the highest security standards:

  • Background checks for all employees with access to customer data
  • Regular security awareness training
  • Strict access controls with principle of least privilege
  • Non-disclosure agreements (NDAs) for all team members

10. Third-Party Security

We carefully vet all third-party services and partners:

All third-party vendors undergo security assessments and must meet our security requirements. We only work with reputable providers who maintain appropriate security certifications and comply with relevant regulations.

11. Vulnerability Management

We maintain a proactive approach to identifying and addressing vulnerabilities:

  • Regular vulnerability scanning and security assessments
  • Automated dependency updates to patch known vulnerabilities
  • Bug bounty program for responsible disclosure
  • Rapid response to security vulnerabilities with 24-48 hour patching SLA

12. Customer Responsibilities

While we provide robust security measures, customers also play a crucial role in security:

  • Use strong, unique passwords for your account
  • Enable multi-factor authentication (MFA)
  • Keep your login credentials confidential
  • Report any suspicious activity immediately
  • Regularly review user access and remove inactive accounts

13. Reporting Security Issues

If you discover a security vulnerability or have security concerns, please report them to us immediately:

Security Contact

Email: [email protected]

Subject: "Security Vulnerability Report"

We take all security reports seriously and will respond within 24 hours. Please do not publicly disclose security issues until we have had a chance to address them.

14. Questions About Security

If you have questions about our security practices or would like more information, please contact us:

My Schedule App

General Inquiries: [email protected]

Security Issues: [email protected]

Website: https://myschedule.app

Security at a Glance

256-bit Encryption

Bank-level encryption for all your data

Daily Backups

Automated backups with disaster recovery

24/7 Monitoring

Continuous security monitoring and alerts

GDPR Compliant

Full compliance with data protection regulations

Your Data is Safe with Us

Join hundreds of businesses trusting My Schedule App with their workforce data

Get Started Contact Us