- Meekan stores information about your availability and habits, only to save you time and organize your day in a smarter, more efficient way. You can request us to completely delete this information and we will do so in a timely manner. We will not share identified personal information with any 3rd party provider.
- Meekan does not and will not store the passwords to any of your accounts.
- Meekan will not send any unsolicited messages to your contact list or trick you into doing that. We will only contact your friends on your behalf when scheduling a meeting.
When you use Meekan, you send pieces of data to Meekan; this can be a name, an e-mail address, or information relating to your appointment. Other data is generated implicitly by your use of Meekan, e.g. log data.
Some of Meekan’s products require you to communicate with Meekan through Instant Messaging (eg. Via Slack, Facebook, Microsoft Teams, Hipchat and more IM platforms). These products require special care on our side, and a more restrictive privacy measures:
We do not collect or keep information from incoming conversations, and we do not process messages transmitted, except for messages related to the explicit usage of the service.
Once our robot is called upon, and scheduling-related talk commences, Meekan uses the messages to extract availability-related meaning (time ranges, meeting duration, etc).
Retention time for the messages we keep is limited to 24 hours, after which the messages are erased automatically, with no recovery option.
Some fragments of the messages are also used to train our AI, in order to better understand our users and provide better service. This content is anonymized before being processed.
Meekan does not, and will not at any point ever sell or share any of your messages with a 3rd party.
Meekan records certain requests and transactions in log files. This log data is used for troubleshooting, statistics, quality assurance, to monitor system security and can be analyzed to that end. Meekan can publish anonymous statistics under the condition that no personally identifiable information can be derived from such statistics.
Log Data may include information such as your IP address, browser type, operating system, the referring web page, location, your mobile carrier, device and application IDs, search terms, and cookie information. We receive Log Data when you interact with our services, for example, when you visit our website, sign into our services, interact with our email notifications, use our mobile application, or visit a third-party website that includes or refers to Meekan’s services.
Meekan also uses Analytics tools to compile usage statistics.
Most Internet browsers automatically accept cookies. You can instruct your browser, by changing its settings, to stop accepting cookies or to prompt you before accepting a cookie from the websites you visit. However, some Services may not function properly if you disable cookies.
Meekan can delete user-accounts if they remain inactive (i.e. not accessed) for 6 month or longer. This process will not delete any information from your personal calendar
Meekan implements several mechanisms to prevent unauthorized access to accounts, or other data.
To access Meekan, you use the unique link which Meekan provides. This link is an important element to prevent unauthorized access. You should send this link only to authorized people, i.e., the people you wish to participate in your Meekan Meeting. The link is unique per voter per meeting, be careful not to share it irresponsibly, or other malicious persons may be able to vote for your meetings.
User-accounts are protected by passwords. You should choose a secure password and ensure its confidentiality to prevent unauthorized access to your account. Meekan does not store any passwords. as it logs you in via Google’s OAuth2 authentication mechanism (https://developers.google.com/accounts/docs/OAuth2)
Inviting from Meekan
You can contact and invite other people to participate in a meeting directly from Meekan. Meekan will need to know the e-mail addresses or phone numbers of the people to be contacted. You can enter these e-mail addresses or phone numbers in the corresponding form. Meekan stores these e-mail addresses in your user-account for your convenience; Meekan will be able to offer you the same contacts again next time you use the service and you will be able to understand if the contact is a Meekan user or not.
Like any other personal information, Meekan will not share participants’ e-mail addresses or phone numbers with third parties. Meekan will not send any e-mail communication to participants’ e-mail addresses or phone numbers without your consent.
You can use your existing Google contacts or mobile contact to gain access to the e-mail addresses and phone numbers of the people to be contacted. In this case, you manually authorize Meekan to access your contacts. Your contacts will still be stored at Google or at your mobile, while Meekan makes a copy of the e-mail addresses to have efficient access. The process of accessing your Google contacts is set up to make sure that Meekan at no time has access to your Google password.
You must connect Meekan with your calendar to make the scheduling process work.
In either case, the connection between Meekan and your calendar can be deleted at any time.
Meekan respects your personal information. We will not share your personal meetings or who you meet with with other users or 3rd parties.
If you connected Meekan with your Calendar, we may share your Free\Busy availability over requested periods. This information sharing is for your benefit, allowing your Meekan contacts to invite you at times you are comfortable with. Unlike calendar sharing in other systems, other users will not be exposed to your full calendar.
You can limit this exposure by contacting us.
Meekan provides optional plugins which extend the service by integrating it into your local environment (calendar and contacts). A plugin is a software that you download and install on your computer, and which has access to your calendar and contacts.
Meekan will use the accessible information via plugins only for the intended purpose. Meekan will only access the information that is necessary to provide the intended service.
Communication between you and Meekan
If you send Meekan a message, this message can be stored to process it, to compile statistical information, to improve our services and support or to get in touch with you.
Location of data
The Meekan databases are located on Google’s Compute Engine servers and are secured as per their policy (https://developers.google.com/cloud/terms/ ).Google is enrolled in the U.S. Department of Commerce Safe Harbor Program and will remain enrolled in this program or another replacement program (or will adopt a compliance solution which achieves compliance with the terms of Article 25 of Directive 95/46/EC) throughout the Term.
Please note that by becoming a user, you have given us your express and informed consent to transfer the data that you provide to us for storage, to our servers at Google.
Sharing personal information
Meekan may share personal information with other companies or individuals only in the following limited circumstances: (i) Meekan has your explicit consent to do so; (ii) Meekan acts in good faith under a legal obligation to share the data; (iii) Meekan needs to access or share the data to protect the security of the service or of others users’ data; (iv) Meekan needs to access or share the data to protect Meekan’s rights and property or to enforce the Terms of Service.
We do not display advertisements in any of our products, and we do not share any information with advertisers.
In order to help secure your personal information, access to your data on Meekan is password-protected. To protect any data you store on the servers used by Meekan, Meekan also regularly audits its system for possible vulnerabilities and attacks. However, since the WWW network is not a 100% secured environment, we cannot ensure or warrant the security of any information you transmit to Meekan. There is no guarantee that information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards. It is your responsibility to protect the security of your login information. We strongly advise you not to communicate any confidential information through any electronic means.