Security Overview

Last updated: April 2026  |  Klaimer, Inc.
The short version: Klaimer only requests read-only calendar access, does not retain raw calendar events after in-session analysis, and does not sell your data. We are built on industry-leading cloud infrastructure providers that deliver strong operational safeguards.

What Klaimer Does With Your Calendar Data

Infrastructure Safeguards We Rely On

Klaimer is built on industry-leading cloud infrastructure providers. These providers supply important infrastructure-level protections, including encrypted data transport, encrypted storage, audited operational controls, backups, secret management, and hosting-layer protections such as DDoS mitigation.

For data we do store, access is restricted at the database layer using our provider's access controls. We also limit internal access to user data to people who need it to operate and support the service.

Important Limits On What We Claim

Some security features offered by our infrastructure providers are optional or depend on account tier and configuration. Unless we explicitly say a specific control is enabled, references on this page are descriptions of platform capabilities rather than promises that every optional safeguard is active in Klaimer's current environment.

Our infrastructure providers maintain audited security programs, including SOC 2 Type 2. That does not automatically mean Klaimer itself is independently SOC 2 compliant.

Examples Of Controls We Only Describe If Enabled

Need More Detail?

For the full legal description of how Klaimer handles personal information, see our Privacy Policy. If you have security or privacy questions, email hello@klaimer.com.

← Back to klaimer.com