CalorieTally
Sign In Get Started

Security

How we protect your nutrition data and ensure platform security

Terms of Service Privacy Policy Cookie Policy Security

Security First: CalorieTally employs comprehensive security measures to protect your personal health data, meal information, and ensure the integrity of our AI-powered nutrition tracking platform.

1. Our Security Commitment

At CalorieTally, we understand that you're trusting us with sensitive health information, personal data, meal photos, and nutrition tracking details. Security is fundamental to everything we do, from our AI processing systems to data storage and user authentication. We implement multiple layers of protection to safeguard your information and maintain the reliability of our nutrition analysis platform.

2. Data Encryption and Protection

We use advanced encryption technologies to protect your nutrition and health data:

End-to-End Encryption

All data transmission between your device and our servers uses TLS 1.3 encryption. This includes meal photos, voice recordings, AI chat messages, and personal health information. Your data is protected during upload, processing, and storage.

Database Encryption

Your meal data, nutrition history, goals, and personal information are encrypted at rest using AES-256 encryption. This ensures that even if unauthorized parties accessed our databases, your data would remain unreadable and protected.

Image Security

Food photos and nutrition label images are stored in encrypted, secure cloud storage with strict access controls. Images are processed through our AI systems in isolated environments and are never accessible to unauthorized personnel.

Voice Data Protection

Voice recordings are processed for transcription in secure, encrypted environments and are permanently deleted from our servers after transcription is complete. Only the text transcription is retained for meal logging purposes.

3. Authentication and Access Control

We implement robust authentication systems to ensure only you can access your nutrition data:

3.1 User Authentication

  • Secure Password Requirements: Strong password policies with complexity requirements
  • Password Hashing: Passwords are hashed using bcrypt and never stored in plain text
  • Session Management: Secure session handling with automatic timeouts
  • Google OAuth Integration: Secure authentication through Google's verified systems
  • Email Verification: Mandatory email confirmation for account activation
  • Account Lockout Protection: Automatic protection against brute force attacks

3.2 Internal Access Controls

  • Least Privilege Access: Employees only have access to data necessary for their specific role
  • Role-Based Permissions: Strict access controls based on job function
  • Multi-Factor Authentication: Required for all administrative access to production systems
  • Access Monitoring: All access to user data is logged and regularly audited
  • Background Checks: Comprehensive screening for employees with data access

4. AI and Processing Security

Our AI-powered nutrition analysis includes specific security measures:

4.1 AI Model Protection

  • Isolated Processing: AI analysis occurs in secure, isolated computing environments
  • Model Security: Our proprietary AI models are protected against reverse engineering
  • Data Anonymization: Personal identifiers are removed before AI training
  • Secure APIs: All AI processing uses encrypted, authenticated API connections

4.2 Chat Data Security

  • Conversation Encryption: All AI chat messages are encrypted in transit and at rest
  • Context Isolation: User conversations are isolated and never mixed with other users' data
  • No Human Review: AI chat conversations are never reviewed by human staff unless explicitly requested for support
  • Data Minimization: Only necessary conversation context is retained for AI functionality

5. Infrastructure and Cloud Security

CalorieTally is built on secure, enterprise-grade infrastructure:

5.1 Cloud Platform Security

  • Enterprise Cloud Providers: Hosted on security-certified cloud platforms with SOC 2 compliance
  • Geographic Distribution: Data redundancy across multiple secure data centers
  • Network Security: Virtual private clouds, firewalls, and network segmentation
  • DDoS Protection: Advanced protection against distributed denial-of-service attacks
  • Load Balancing: Distributed architecture for reliability and performance

5.2 Application Security

  • Secure Development: Security-first approach to all code development
  • Code Reviews: Mandatory security reviews for all code changes
  • Vulnerability Scanning: Regular automated security scans of our application
  • Dependency Management: Regular updates and security patches for all dependencies
  • Input Validation: Comprehensive validation of all user inputs and uploads

6. Payment and Subscription Security

We use industry-leading payment security through PayPal integration:

6.1 Payment Processing

  • PayPal Integration: All payments processed through PayPal's secure, PCI DSS compliant systems
  • No Stored Card Data: We never store credit card or payment information on our servers
  • Secure Checkout: Encrypted payment flows with fraud detection
  • Subscription Management: Secure handling of subscription changes and cancellations
  • Financial Data Protection: Payment records stored according to financial regulations

6.2 Fraud Prevention

  • Transaction Monitoring: Automated detection of suspicious payment activity
  • Account Verification: Email verification required for subscription changes
  • Secure API Calls: All PayPal API communications use encryption and authentication
  • Audit Trails: Complete logging of all payment and subscription activities

7. Data Backup and Recovery

We maintain comprehensive backup systems to protect against data loss:

7.1 Backup Security

  • Encrypted Backups: All backups are encrypted using the same AES-256 standards
  • Geographic Distribution: Backups stored in multiple geographic locations
  • Regular Testing: Backup integrity and recovery procedures tested monthly
  • Automated Backups: Daily automated backups of all nutrition and user data
  • Point-in-Time Recovery: Ability to restore data to specific timestamps

7.2 Disaster Recovery

  • Recovery Planning: Comprehensive disaster recovery procedures and documentation
  • Redundant Systems: Multiple system redundancies to prevent single points of failure
  • Quick Recovery: Designed to restore service within hours in case of major incidents
  • Data Integrity: Verification procedures to ensure data completeness after recovery

8. Monitoring and Incident Response

We maintain continuous monitoring and rapid response capabilities:

8.1 Security Monitoring

  • 24/7 Monitoring: Continuous monitoring of system security and performance
  • Automated Alerts: Real-time notifications for any security-related events
  • Log Analysis: Comprehensive logging and analysis of all system activities
  • Anomaly Detection: Machine learning-based detection of unusual patterns
  • Intrusion Detection: Advanced systems to detect and prevent unauthorized access

8.2 Incident Response

  • Response Team: Dedicated security incident response team
  • Response Procedures: Documented procedures for different types of security incidents
  • User Notification: Clear protocols for notifying affected users when necessary
  • Forensic Analysis: Capabilities for investigating security incidents
  • Continuous Improvement: Regular updates to security procedures based on lessons learned

9. Compliance and Certifications

CalorieTally adheres to industry standards and regulatory requirements:

GDPR Compliance

Full compliance with European General Data Protection Regulation for user privacy and data rights

CCPA Compliance

Adherence to California Consumer Privacy Act requirements for data transparency and user control

SOC 2 Type II

Our cloud infrastructure providers maintain SOC 2 Type II certification for security controls

PCI DSS

Payment processing through PayPal's PCI DSS compliant systems for financial data protection

10. Mobile Application Security

Our mobile applications include additional security measures:

10.1 App Security Features

  • Code Obfuscation: Application code is protected against reverse engineering
  • Certificate Pinning: SSL certificate validation to prevent man-in-the-middle attacks
  • Secure Storage: Sensitive data stored using device keychain/keystore systems
  • Biometric Authentication: Support for fingerprint and face recognition where available
  • App Integrity: Protection against app tampering and unauthorized modifications

10.2 Device Security

  • Device Binding: Account security tied to specific device identifiers
  • Automatic Logout: Session timeouts for security when devices are left unattended
  • Secure Communication: All app-to-server communication uses encrypted channels
  • Local Data Protection: Offline data cached securely on devices

11. Third-Party Security

We carefully evaluate and monitor all third-party integrations:

11.1 Vendor Security Assessment

  • Google Services: OAuth authentication and email services through Google's secure infrastructure
  • PayPal: Payment processing through PayPal's certified, secure systems
  • AI Providers: Food recognition and natural language processing through vetted, secure AI services
  • Cloud Storage: Image and data storage through enterprise-grade, encrypted cloud services

11.2 Integration Security

  • API Security: All third-party API communications use authentication and encryption
  • Data Minimization: Only necessary data is shared with third-party services
  • Contract Requirements: Security requirements included in all vendor contracts
  • Regular Reviews: Periodic assessment of third-party security practices

12. User Security Best Practices

While we implement comprehensive security measures, your actions also contribute to security:

12.1 Account Security

  • Strong Passwords: Use unique, complex passwords for your CalorieTally account
  • Email Security: Keep your registered email account secure and monitored
  • Regular Updates: Keep your mobile app updated to the latest version
  • Secure Networks: Avoid using public Wi-Fi for sensitive account activities
  • Logout Practices: Log out of shared or public devices

12.2 Data Protection

  • Photo Privacy: Be mindful of what's visible in food photos you upload
  • Voice Recordings: Record in private environments when using voice input
  • Account Monitoring: Regularly review your account activity and meal history
  • Suspicious Activity: Report any unusual account activity immediately

13. Vulnerability Management

We maintain a proactive approach to identifying and addressing security vulnerabilities:

13.1 Security Testing

  • Regular Assessments: Quarterly security assessments and penetration testing
  • Automated Scanning: Continuous vulnerability scanning of our applications and infrastructure
  • Code Analysis: Static and dynamic analysis of application code for security issues
  • Third-Party Audits: Annual security audits by independent security firms

13.2 Vulnerability Response

  • Rapid Patching: Critical vulnerabilities addressed within 24-48 hours
  • Coordinated Disclosure: Working with security researchers on responsible disclosure
  • Update Procedures: Systematic approach to applying security updates
  • Communication: Transparent communication about security updates when appropriate

14. Security Contact and Reporting

We encourage responsible disclosure of security vulnerabilities and maintain open communication:

14.1 Security Contact

  • Response Time: We acknowledge security reports within 24 hours
  • Secure Communication: PGP encryption available for sensitive reports
  • Investigation: Thorough investigation of all reported security issues

14.2 General Security Questions

  • Support Email: support@calorietally.com

15. Continuous Security Improvement

Security is an ongoing process, and we continuously work to enhance our protection:

15.1 Security Program Evolution

  • Regular Training: Ongoing security training for all team members
  • Technology Updates: Regular evaluation and implementation of new security technologies
  • Industry Standards: Staying current with evolving security best practices
  • Threat Intelligence: Monitoring emerging threats specific to health and nutrition platforms
  • User Feedback: Incorporating user feedback to improve security features

15.2 Future Security Enhancements

  • Advanced Authentication: Exploring additional authentication methods
  • Zero-Trust Architecture: Moving toward zero-trust security models
  • AI Security: Enhancing AI model protection and privacy
  • User Privacy Controls: Expanding user control over data and privacy settings

Effective Date: 2025/06/27

Last Updated: 2025/06/27

CalorieTally
Terms Privacy Cookies Security Sign In Sign Up
© 2024 CalorieTally. All rights reserved.