Privacy and
Trust

In a study done by University of Victoria, Github and Microsoft, it was discovered that there are more dimensions that need to be measured to truly understand and improve productivity.

Privacy and <br>Trust Privacy and <br>Trust Privacy and <br>Trust Privacy and <br>Trust

Keepy's ground rules for privacy

Analysis of company work tools only Analysis of company work tools only

Professional work tools analysis from

  • Project/Task management
  • Source code management
  • Documentation
  • Communication
  • Organizational management systems
Team level reports Team level reports

To protect personal privacy, the analysis is conducted and communicated at the team level, with at least four members.

No content analysis nor storage No content analysis nor storage

Keepy analyzes metadata from work tools that are already accessible to managers.
There is no analysis of task or communication content.

Keepy protects employee privacy and does not analyze personal data sources such as WhatsApp, social media, email, web-browsing, etc.

Security Highlights

Security Highlights Security Highlights
Cloud

A cloud-based SaaS solution.Installation in just a few clicks
All of Keepy’s data is hosted on Amazon Web Services (AWS) databases, located in the United States/EU

Encryption

All data is encrypted.
All Personally identifiable information (PII) details are encrypted.

 

Encryption in Transit
Our applications encrypt in transit with TLS/SSL.

 

Encryption at Rest
All databases are encrypted at rest.

Pentesting

Third-Party Audits
Keepy undergoes independent third-party assessments and security consulting every six months.

 

Third-Party Penetration Testing
Independent third-party penetration testing is performed bi-annually to ensure uncompromised security.

 

Vulnerability Scanning
We regularly perform vulnerability scanning and actively monitor for threats.

For the complete list of security standards and tests, please contact us.