SOC2 Type II
Security, availability, and confidentiality controls
Data Protection
Healthcare data protection practices
24/7 Monitoring
Continuous security monitoring
MFA Support
Multi-factor authentication available
How We Protect Your Data
Multiple layers of security ensure your scheduling data remains private, secure, and always available.
Bank-Level Encryption
All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Your scheduling data is as secure as your bank account.
- AES-256 encryption at rest
- TLS 1.3 for data in transit
- Encrypted backups
SOC2-Compliant Infrastructure
Our infrastructure meets SOC2 Type II compliance standards, ensuring rigorous security controls and regular third-party audits.
- Annual third-party audits
- Continuous monitoring
- Documented security policies
Healthcare-Grade Security
Built with healthcare in mind. Our security practices protect sensitive scheduling information with enterprise-grade controls.
- Access controls
- Audit logging
- Data integrity safeguards
Continuous Backups
Your data is continuously backed up across multiple geographic regions. Point-in-time recovery available for complete peace of mind.
- Real-time replication
- Multi-region redundancy
- 30-day backup retention
Role-Based Access Control
Fine-grained permissions ensure staff only see what they need. Admins have complete control over who can view and modify schedules.
- Granular permissions
- Admin controls
- Audit trails for changes
99.9% Uptime Guarantee
Our infrastructure is designed for maximum reliability. Real-time monitoring and redundant systems ensure your scheduling never stops.
- SLA guarantee
- 24/7 monitoring
- Automated failover
Our Security Practices
Proactive measures to ensure your data stays secure.

