Your calendar, your data

When you use Clockwise, you trust us with your most valuable resources: your time and the data that comes with it. We take that responsibility seriously, which is why we put security and privacy first in everything we do.

Our guiding principles

Never selling data

We do not, and will never, sell your data

Protecting data

We apply advanced security measures to protect your data, including utilizing encryption protocols like AES 256 and TLS 1.2

Staying compliant

We comply with all current data privacy laws, including GDPR, CCPA and CPRA

Purpose-specific data collection

We collect data only when it serves an explicit purpose. We don't collect data for any purpose other than those stated on our privacy policy

Clockwise AI: security & privacy

Want to learn more? Check out our documentation


Security Overview

See an overview of our current practices and commitments.


SOC2 Report

Our SOC 2 Type II report is available for review. NDA required.

Request access

Data Processing Addendum

Review our DPA and up-to-date list of data processors.

Review DPA

We set a high security bar for ourselves and our partners

We protect your data from the moment you create your account. We use Google’s OAuth service to securely connect your Clockwise account with your work email and use TLS and AES encryption to protect your data in transit and at rest.


GDPR compliant


CCPA compliant


SOC 2 Type II compliant

We minimize our access to maximize your security

To move meetings on your behalf and free up time in your day, we ask for four key permissions. Here’s what we need, and why:



See, edit, share, and permanently delete all the calendars you can access using Google Calendar. This allows us to see your calendar and move events.



View users on your domain. This helps us make sure that the meeting times we suggest work for your teammates, too.



See and download your contacts. This lets us show your teammates’ names and profile images in your events.



View calendar resources on your domain. This shows us conference room availability for your meetings.

Configurable processing for enterprise use cases

Clockwise customers can choose to not share meeting descriptions with Clockwise so that they are never stored in our database. This provides an additional layer of security for organizations with strict privacy and/or regulatory requirements.

Find a bug?

We have dedicated teams working proactively to identify potential vulnerabilities and emerging threats. But building a safer web takes all of us. To encourage our community to contribute, we pay out Bug Bounty awards to people who are able to find vulnerabilities in Clockwise.

If you believe you have identified a vulnerability, we’d love to hear about it!

Email Security team