How we protect your team's data.
We're a small team. That means we can't hide behind a 50-page PDF — so we tell you the principles we run on, in plain language.
Encrypted in transit and at rest
Every request is encrypted on the wire. Sensitive content — handover notes, alerts, integration secrets — is encrypted at the application layer with keys unique to your tenant, so a stolen database file is not a stolen tenant.
Strict tenant isolation
One company's data is never queryable from another tenant's session. Cross-tenant lookups are treated as not found — we do not even acknowledge that another tenant's record exists.
Sensitive notes auto-delete
Handover notes and alerts are short-lived by design: they expire automatically once the operational moment has passed. Your team's day-to-day details do not sit in our database forever.
Audit trail
Every change to shifts, employees, access and integration settings is logged with who, when and what. You can review the trail from your Settings, and so can your auditor.
Off-host encrypted backups
Backups are encrypted and stored on infrastructure separate from the live database. Restore is exercised regularly so a recovery is a routine, not a fire drill.
Responsible disclosure
Found something? Email info@schedio.team. We acknowledge promptly and credit reporters in our changelog unless you ask us not to.
Compliance
Schedio is built on a SOC 2 and NY SHIELD baseline: documented security policies, an internal access review, and an independent assessment on the roadmap. We can share our current security overview under NDA — email info@schedio.team.
We are the controller of identity data (email, name) and the processor of the shift and employee data your tenant uploads. A DPA template is available on request to paying customers — email info@schedio.team.