SECURITY

Securely powering millions of connections

Trust Calendly to keep your data secure with enterprise-grade admin management, security integrations, data governance, complianceaudits, and privacy protections.

Simplified scheduling for more than 20 million users worldwide

Market-leading software meets enterprise-grade security

Customer Data Protection

Infrastructure Security

Application Protection

Compliance & Privacy

Org Security

Account Protection

Request documentation via Whistic

Calendly uses Whistic to securely share company and product security profiles as well as detailed documentation required for vendor security assessments.

Certifications and frameworks

SOC 2 (Type 2)

Security, availability, and confidentiality trust services criteria

SOC 3

Overview of Service Organization Controls

GDPR

Follow guidelines for data protection and data subject rights for EU residents

CCPA

Follow guidelines for privacy rights and consumer protection for California residents

CSA STAR

Cloud Security alliance STAR Level One self assessment for trust assurance and risk

SOC 3

Overview of Service Organization Controls

ISO/IEC 27001

Follow guidelines to secure information in all forms and protect confidentiality of data.

FINRA

FINRA guidelines and meet cybersecurity requirements

“We’re at a monumental moment in our history where workers have an endless number of devices at their disposal, meaning security leaders have a greater responsibility to users, customers, and employees safely into their new era.”

Frank Russo
Calendly

Adapt to evolving business needs — without the risk

Security at scale

More people? No problem. Flexible access management tools fold seamlessly into your corporate policies and IT workflows so nothing falls through the cracks. Calendly offers SSO, SCIM, Domain Control, an activity log, and more.

Domain control and data protection

Claim your corporate domain and establish how new employees signing up for Calendly request access to your centralized, IT-managed account

Collaboration with control

Empower your remote workforce to schedule efficiently as a team without adding risk to the business.

Enterprise-grade data governance

Maintain compliance with Calendly’s governance and risk management capabilities — such as global retention policies, custom terms of service, data deletion, audit tracking, and more.

Fraud, Trust, and Safety

Security and the safeguarding of customer data shouldn’t be an afterthought. Calendly’s dedicated team constantly enhances our security techniques and addresses identity impersonation, fraud, and other suspicious activity.
Read our security white paper →

“The security aspect of Calendly for enterprise was important and the ease of deploying it out to the people that needed it. We got over a hundred licenses and it was really easy to set it up and deploy it out to the people.”

Procurement Manager
International media company
SECURITY

Additional resources

Privacy Policy

Understand how your data is collected and used.

Terms of Use

The legal agreement between you and Calendly, LLC.

Security White Paper

A technical overview of our security approach.

Privacy White Paper

An overview of our privacy program.

Privacy White Paper - Calendly's Prelude

An overview of our privacy program for Calendly's Prelude

Report a security issue

A technical overview of our security approach.

Easy access for easy bookings

Share your Calendly link right from your browser, so you can schedule meetings without the back-and-forth.