Privacy Policy
We are committed to protecting your privacy and ensuring the security of your data. This policy outlines how we collect, use, and safeguard your information.
Last updated: March 1, 2026
1. Information We Collect
We collect information you provide directly to us, such as when you create an account, update your profile, or communicate with us. This includes:
- Personal Details: Name, email address, phone number, and mailing address.
- Business Information: Gym name, facility details, and member data you upload to the platform.
- Payment Information: Billing details which are processed securely by our payment processors. We do not store raw credit card information.
- Usage Data: Information about how you access and use our services, including IP address, device type, and browser details.
2. How We Use Your Information
We verify and use the collected information for the following specific purposes:
- Service ProvisionTo provide, maintain, and improve our gym management services and features.
- CommunicationsTo send technical notices, updates, security alerts, and administrative messages.
- SupportTo respond to your comments, questions, and customer service requests.
- AnalyticsTo monitor and analyze trends, usage, and activities in connection with our services.
3. Disclosure of Information
We do not sell your personal information. However, we may share information with certain third parties to facilitate our services:
4. Method of Disclosure
Information is disclosed via secure, encrypted data transmission channels. All API integrations with third-party providers are authenticated and maintained using industry-standard security protocols such as OAuth, API keys, and HTTPS/TLS encryption. We ensure that our data sharing contracts with third parties include strict data protection clauses.
5. Security Practices
We employ robust security measures to safeguard your personal information against loss, theft, and unauthorized access. Our security practices include:
Encryption
Data is encrypted in transit (using SSL/TLS) and at rest to ensure confidentiality.
Access Controls
Strict role-based access controls limit data access to only authorized personnel.
Regular Audits
We conduct regular security audits and vulnerability assessments to identify and mitigate risks.
Data Centers
Our infrastructure is hosted in secure, certified data centers with 24/7 monitoring.