Data Security at Weavit

We take our relationship with your data very seriously.

Your Emails

What kind of access do we have?
  • We have Google and Outlook’s lowest level of read-only access to your emails where we can only access your email header fields.
How do we use your emails?
  • We use emails only to create contacts in your world and give your insights about them.
  • We do not read your emails.

Your Calendar

What kind of access do we have?
  • We have read-only access to your Google and Outlook calendars.
How do we use your calendar?
  • We synchronize your calendar with your other calendars so you can see insights about attendees and take dynamic notes linked to those events.

Your Contacts

What kind of access do we have?
  • We have read-only access to your Google and Outlook contacts.
  • We can read existing local phone contacts and add new ones if you ask us to.
How do we use your contacts?
  • We automerge duplicate contacts as well as autolink related contacts.

Your Links

What kind of access do we have?
  • All your links are private to you, encrypted, and not shared with anybody.
How do we use your links?
  • We do autolink some of your assets together so you have a knowledge graph to start with.

Your Documents

What kind of access do we have?
  • All your documents are private to you, encrypted, and not shared with anybody.
How do we use your documents?
  • We don’t. Only you can view your documents.

Our Security Protocol

AICPA Logo
ISO 27001 logo

Top-Tier Partners

We work with Amazon Web Services and Google Cloud Platform which are ISO certified and GDPR compliant.

Encryption at-rest

Your data is stored and 
encrypted with industry
 standard AES-256.

Encryption in-transit

Between your phone and our servers, your data is always encrypted using industry-standard TLS (Transport Layer Security).

Passwordless

We do not store any password on our side, so you can use common Single Sign-On (SSO) like Google, LinkedIn, or Apple.

Cloud Key
Management

Our encryption keys are converted 
and rotated every so often to guarantee the best encryption.

Annual & Monthly
Security Audits

We perform monthly in-house security audits to ensure that our systems are protected. We went through Google’s very strict security checks (performed by NCC).

Want to know more?

Read our Privacy Policy