Security & Privacy

Trust is the cornerstone of all hospitality — which is why we put our user's privacy at the center of everything we do.

Too many companies treat privacy as an inconvenience and data security as an after thought. They hide behind "Terms of Service" so long that even the lawyers that write them don't read them.

We find this unacceptable and believe that users have the right to understand what is happening to their data and what measures we are taking to keep their personal information secure, which is why we have spelled it out in a way that is easy to understand.

Our promise is simple..

  • Your Data Will Never Be Sold

    Or shared with any third party without your explicit permission. We don't sell ads or referrals so our users are our customers and never our product. 

  • Your Data is Secure

    We take extraordinary measures to ensure user data is secure, employing the strictest privacy strandards and using the latest and greatest tools. 

  • Your Data is Yours

    Your information belongs to you. Any data shared with Sevenstar may be downloaded at any time and deleted from our servers at your request. 


We have built our software stack and development organization with a privacy-first mindset. Here are some of the things we are doing to keep your data secure. 

Security & Encryption
Alien monster 1f47e

Our software is built on top of secure cloud infrastructure that is SOC 1, SOC 2 and ISO 27001 certified.

When you use the app, data transmitted between your device and our servers is protected using 256-bit TLS encryption and data stored in our databases are encrypted using AES-256.

Dedicated Database
Oil drum 1f6e2 fe0f

User data is never co-mingled, meaning that each customer gets their own dedicated application with a seperate and secure database. This greatly reduces the chances of co-contamination and ensures users can not access data outside of their organization. 

Two-Factor Authentication
Magic wand 1fa84

Apps are set to the strictest privacy standards by default, including two-factor authentication (2FA) using secure magic links, to limit the risk of account takeover and password compromise.

Granular Access Control [Enterprise]
Abacus 1f9ee

Our enterprise plans (coming soon) offer additional control and granularity over who has access to specific data within your organization.

Onshore Development & Data
Flag united states 1f1fa 1f1f8

We do not outsource any software development and all application development and account administration is done by our in-house US-based team. Which means your data will not be exposed to external software developers 

Data is stored on US based servers maintained by Amazon Web Services (AWS) and monitored around the clock.