Your Data is Safe With Us

EasyChurch is built on the principle that your congregation's data belongs to you — and only you. We use enterprise-grade security practices to keep it that way.

🔐
TLS 1.3 EncryptedAll data in transit
🏦
AES-256 At RestAll stored data
🏢
Complete IsolationPer-church data separation
🔄
Daily Backups30-day retention
🇵🇭
NPC CompliantRA 10173 Data Privacy Act

Security built into every layer

From the moment data enters EasyChurch to the moment you access it, every step is protected by multiple layers of security controls.

🔒

Encryption in Transit

All communication between your browser and EasyChurch servers is encrypted using TLS 1.3 — the latest and most secure transport layer protocol. We enforce HTTPS on all endpoints and reject insecure connections.

🏦

Encryption at Rest

Your data is encrypted at rest using AES-256 — the same standard used by banks and government agencies. Database volumes are fully encrypted, meaning physical disk access cannot expose your data.

🔑

Secure Authentication

EasyChurch uses JWT-based session authentication stored in HTTP-only cookies, making them inaccessible to browser scripts. Sessions expire automatically after inactivity to prevent unauthorized access.

🏢

Multi-Tenant Isolation

Every church is a completely separate tenant. Your data is logically isolated at the database level using strict church-scoped queries. It is architecturally impossible for one church's data to be accessed from another church's account.

👤

Role-Based Access Control

Every user in EasyChurch has a defined role — Admin, Moderator, or Group Leader — and can only access data and actions appropriate for that role. Admins can revoke access instantly at any time.

🛡

Input Validation & SQL Safety

All user input is validated and sanitized before processing. Our backend uses parameterized queries exclusively, eliminating the risk of SQL injection. We follow OWASP Top 10 guidelines in our development process.

🔄

Automated Daily Backups

Your data is automatically backed up every 24 hours with a 30-day retention window. Backups are stored in geographically separate infrastructure to ensure recovery from any disaster scenario.

📋

Audit Logging

Sensitive actions — member data changes, exports, role changes, login events — are logged with timestamps and user identifiers. Admins can review activity logs to detect any unauthorized changes.

🌐

Secure Infrastructure

EasyChurch is hosted on enterprise-grade cloud infrastructure with 99.9% uptime SLA. Our servers are housed in ISO-certified data centers with 24/7 physical security, redundant power, and network monitoring.

Your data belongs to you

We are stewards of your congregation's data — not owners. Here is exactly how we handle it.

What we collect

  • Member data you enter into the system — names, contact information, attendance, and notes. This data is yours.
  • Account information — your church name, admin email, and billing details needed to operate the service.
  • Usage analytics — anonymous, aggregated usage data to improve the platform. We do not identify individual users in analytics.

What we do NOT do

  • We never sell your data or your congregation's personal information to third parties.
  • We never use your member data for advertising, profiling, or any commercial purpose outside of providing the EasyChurch service.
  • We never share your data with other EasyChurch customers or allow cross-tenant data access of any kind.
  • We do not access your data without your explicit request (e.g., during support sessions — and only with your permission).

Compliant with Philippine and international standards

We align our security practices with recognized frameworks and Philippine regulations.

🇵🇭

RA 10173 — Data Privacy Act of 2012

EasyChurch is designed in compliance with the Philippines' Data Privacy Act. Your congregation's personal data is collected lawfully, stored securely, and processed only for legitimate purposes. You retain full rights as the Personal Information Controller for your church's data.

🔐

OWASP Top 10

Our development team follows the OWASP Top 10 guidelines — the globally recognized standard for web application security. We guard against SQL injection, XSS, broken authentication, insecure data exposure, and all other common vulnerabilities.

💳

PCI-DSS Compliant Payments

EasyChurch never stores payment card information. All billing is handled by PCI-DSS Level 1 certified payment processors. Your credit card and GCash details are protected by the highest standards in payment security.

🌐

ISO 27001 Infrastructure

Our hosting infrastructure operates in data centers certified to ISO 27001 — the international standard for information security management. This ensures our physical and operational security meets rigorous independent standards.

From entry to deletion — your data at every stage

📥

Data Entry

All data is submitted over TLS-encrypted connections. Server-side validation and parameterized queries ensure no malicious input can reach the database.

🗄

Storage

Data is stored in AES-256 encrypted MySQL databases on dedicated, church-isolated schemas. No two churches share the same database namespace.

🔄

Backup

Automated daily backups are retained for 30 days. Backups are encrypted with the same AES-256 standard and stored in geographically separate facilities.

📤

Export

You can export all your data (members, attendance, reports) at any time in Excel or CSV format. We believe in full data portability — your data is never held hostage.

🗑

Deletion

Upon account cancellation, your data remains accessible for 30 days for export. After this window, all church data — including backups — is permanently and irreversibly deleted from our systems.

Found a vulnerability?

We take security reports seriously. If you discover a potential security vulnerability in EasyChurch, we ask that you disclose it responsibly so we can address it before it affects our users.

Please email your findings to security@easychurch.ph with a clear description of the vulnerability, steps to reproduce, and its potential impact. We will acknowledge your report within 48 hours and keep you updated as we investigate and resolve the issue.

Report a Vulnerability

Our Commitment to You

  • We will acknowledge your report within 48 business hours
  • We will keep you informed of our progress as we investigate
  • We will work to fix confirmed vulnerabilities in a timely manner
  • We will not take legal action against researchers who follow responsible disclosure guidelines
  • We will notify affected churches promptly if a breach ever occurs

Questions about security? Let's talk.

Our team is happy to answer any questions about how we protect your church's data before you commit to a plan.