In today’s digital world, your business data is one of your most valuable assets. Customer details, leads, and daily operations are not just information—they represent your time, effort, and income.
At Calsy CRM, we take this responsibility seriously. Security is not just a feature we added later—it is built into the core of how Calsy works.
This guide explains, in simple terms, how we protect your data and why you can trust Calsy.
🛡️ 1. Your Identity Is Protected by Google
Calsy uses Google OAuth 2.0 for login.
- You sign in using your Google account
- We never see your password
- We never store your password
Why this matters
Most data breaches happen because passwords are stolen. Calsy removes this risk completely.
Instead of managing passwords ourselves, we rely on Google’s world-class security infrastructure:
- Advanced threat detection
- Login alerts
- 2-Step Verification (OTP / device approval)
👉 Your account security is backed by Google—not just us.
🔐 2. Your Data Is Encrypted at All Times
🔒 At Rest (Stored Data)
Your data is encrypted using AES-256 encryption.
- Banks
- Government systems
- Global tech companies
Even if someone accesses the database, data appears as unreadable code.
🌐 In Transit (Data Transfer)
Data is protected using SSL/TLS encryption (HTTPS).
- Prevents Wi-Fi hacking
- Stops data interception
- Blocks unauthorized access
👉 Without your access, your data is useless to anyone else.
🧠 3. Built with Privacy-First Principles
If we don’t need it, we don’t collect it.
- Only essential data is collected
- No unnecessary tracking
- No access to unrelated device data
🔍 4. We Designed It So Even We Can’t Misuse Your Data
Many platforms technically can access user data—even if they claim they don’t.
- Data encrypted before storage
- Access tied to Google identity
- Internal exposure minimized
👉 We intentionally limit our own access to your data.
🛠️ 5. Application-Level Security
- Code Obfuscation: Prevents reverse engineering
- Minimal Attack Surface: Reduces vulnerabilities
☁️ 6. Your Data Is Safe Even If You Lose Your Phone
- Secure cloud backup
- Instant data restore
- No business interruption
👉 Lose your phone, not your business.
✅ 7. Your Personal Security Checklist
- ✔ Enable Google 2-Step Verification
- ✔ Use screen lock (PIN / Fingerprint)
- ✔ Keep Cloud Sync enabled
- ✔ Avoid unknown devices
🚫 What We Never Do
- ❌ Sell your data
- ❌ Share your data
- ❌ Store passwords
- ❌ Read your business data
💬 A Simple Promise
Your data belongs to you.
Not to us. Not to anyone else.