What is Toasty's security standard?
We use secure servers
Toasty is hosted on Amazon Web Services (AWS) servers in the United States, Germany and Singapore. AWS operates on a high security measure and it is documented on this whitepaper.
We use secure video conferencing solutions
Toasty uses Jitsi, which is an open-source video conferencing infrastructure that is privacy-oriented. It uses hop-by-hop encryption. This means that anything that you send traveling to the server is encrypted, then decrypted on the server, re-encrypted, and sent to everyone who is meant to receive it.
We use secure connections
We use HTTPS secure connections for all transactions. HTTPS is a secure communications protocol that eliminates the possibility of a third party breach in the communication or your payment information
We keep your data safe
Toasty stores your information on our AWS servers. We only use 3rd party processors to deliver the best services possible to you, e.g. to send product updates emails to you. We don’t sell personal data to processors.
We offer password-protected meeting session
You can easily add a password to your meeting session to prevent anyone from joining your session intrusively.
We do not store credit card information
We take credit card data security very seriously, and we do not have access to your credit card information. We use Paddle to securely handle credit card information.