Features
Why Sked?
Sked Social is a third party app and is not affiliated with or endorsed by any social network platforms.
See our Terms & Privacy Policy.
See our Terms & Privacy Policy.
© 2024 Sked Social. All rights reserved.
Sked Social takes security and privacy seriously for all of our customers. We use the governance, risk and security compliance tool Drata to provide continuous monitoring of our GRC approach including:
Sked successfully completed our SOC 2 Type 1 certification in November 2024, with a successful independent audit completed by CPA firm Assurance Lab. SOC 2 represents a high standard that is globally recognised to demonstrate our commitment to securing our customers' critical information assets. SOC 2 is similar to other frameworks like ISO 27001.
Sked Social anticipates to complete its Type 2 certification in Q1 2025, which audits a minimum 3 monthly observation period.
Access to our audit reports, policies and procedures, or attestation certification is available on request to enterprise customers.
Please speak to sales or customer success (as appropriate) if you require access to this data.
Sked is an Australian company and adheres to the Australian Privacy Principles, which are substantially similar to GDPR and other privacy regulation in other jurisdictions. See our Privacy Policy for more details. We also have other regulatory obligations to regulators such as data breach notification obligations with the Office of the Australian Information Commissioner.
Sked Social is committed to ensuring the safety and security of our customers and employees. We aim to foster an environment of trust, and an open partnership with the security community, and we recognize the importance of vulnerability disclosures and whistleblowers in continuing to ensure safety and security for all of our customers, employees and company.
We have developed this policy to both reflect our corporate values and to uphold our legal responsibility to good-faith security researchers that are providing us with their expertise and whistleblowers who add an extra layer of security to our infrastructure.
How to Submit a Vulnerability
To submit a vulnerability report to Sked Social's Product Security Team, please use the email [email protected].
Preference, Prioritization, and Acceptance Criteria
We will use the criteria from the next sections to prioritize and triage submissions.
What we would like to see from you
What you can expect from Sked Social
If we are unable to resolve communication issues or other problems, Sked Social may bring in a neutral third party to assist in determining how best to handle the vulnerability.
Please note that we do not currently compensate third party researchers (ie those not engaged by Sked Social directly for the purposes of security research or assessment) through bug bounties or similar for their reports.
Sked Social will not engage in legal action against individuals who submit vulnerability reports through our Vulnerability Reporting inbox. We openly accept reports for the currently listed Sked Social products. We agree not to pursue legal action against individuals who:
We ask that security researchers adhere to our Terms of Service.
How to Submit a Report
To anonymously report an information security program violation or a violation of related laws and regulations, please contact our external counsel Paul Noonan at the email [email protected].
Preference, Prioritization, and Acceptance Criteria
We will use the criteria from the following sections to prioritize and review submissions
What we expect from you
What you can expect from Sked-Social
Last updated 21 November 2024.