Data Security at Weavit

We take our relationship with your data very seriously.

Your Emails

What kind of access do we have?
  • We have Google and Outlook’s lowest level of read-only access to your emails where we can only access your email header fields.
How do we use your emails?
  • We use emails only to create contacts in your world and give your insights about them.
  • We do not read your emails.

Your Contacts

What kind of access do we have?
  • We have read-only access to your Google and Outlook contacts.
  • We can read existing local phone contacts and add new ones if you ask us to.
How do we use your contacts?
  • We automerge duplicate contacts as well as autolink related contacts.

Your Links

What kind of access do we have?
  • All your links are private to you, encrypted, and not shared with anybody.
How do we use your links?
  • We do autolink some of your assets together so you have a knowledge graph to start with.

Your Documents

What kind of access do we have?
  • All your documents are private to you, encrypted, and not shared with anybody.
How do we use your documents?
  • We don’t. Only you can view your documents.

Our Security Protocol

AICPA Logo
ISO 27001 logo

Top-Tier Partners

We work with Amazon Web Services and Google Cloud Platform which are ISO certified and GDPR compliant.

Encryption at-rest

Your data is stored and 
encrypted with industry
 standard AES-256.

Encryption in-transit

Between your phone and our servers, your data is always encrypted using industry-standard TLS (Transport Layer Security).

Passwordless

We do not store any password on our side, so you can use common Single Sign-On (SSO) like Google, LinkedIn, or Apple.

Cloud Key
Management

Our encryption keys are converted 
and rotated every so often to guarantee the best encryption.

Annual & Monthly
Security Audits

We perform monthly in-house security audits to ensure that our systems are protected. We went through Google’s very strict security checks (performed by NCC).

Want to know more?

Read our Privacy Policy