Security

At Magpie Meetings, we take security seriously and implement industry-standard practices to protect your data. This page outlines our security measures and how we safeguard your information.

1. Data Encryption

1.1 Data in Transit

All data transmitted between your browser and our servers is encrypted using:

1.2 Data at Rest

Sensitive data stored on our systems is protected through:

2. Access Controls

2.1 Authentication

2.2 Administrative Access

3. Infrastructure Security

3.1 Application Security

3.2 Server Security

4. Monitoring and Logging

Logs are retained for a limited period and are used solely for security, troubleshooting, and service improvement purposes.

5. Incident Response

5.1 Security Incident Handling

In the event of a security incident, we follow a structured incident response process:

5.2 Data Breach Notification

If a data breach occurs that affects your personal data, we will:

6. Third-Party Security

6.1 Service Provider Vetting

We carefully select third-party service providers (sub-processors) who handle your data. All providers must:

See our Sub-processors page for a complete list of third-party services we use.

6.2 Integration Security

When you connect third-party services (Google Calendar, Zoom, etc.):

7. Third-Party Audits and Compliance

While Magpie Meetings is currently a free service, we are committed to transparency and security best practices:

As the service grows, we may pursue formal security certifications such as SOC 2 Type II or ISO 27001.

8. Vulnerability Disclosure

8.1 Responsible Disclosure Policy

We welcome and appreciate responsible disclosure of security vulnerabilities. If you believe you have found a security issue:

8.2 What to Report

Examples of security vulnerabilities we want to hear about:

9. User Responsibility

While we implement strong security measures, users also play a critical role in security:

10. Security Updates

We regularly update our security practices in response to new threats and industry developments. This page will be updated to reflect significant changes to our security posture. Check the "Last updated" date at the top of this page.

11. Contact Us

For security-related questions, concerns, or to report a vulnerability, contact us at:

For all contact options, visit our Contact page.