Features
Project Management

Plan, manage and track your projects from conception till delviery.

Proposal Management

Manage the proposal lifecycle and close deals faster.

Customer Management

Manage your customers' relationship and ensure thier needs are properly fulfilled.

Team Management

Manage your resources and utilize their time for most efficient performance.

Payment Management

Track your payments and ensure your business continuity.

Supplier Management

Manage your supply chain and track your outbound expenses.

Budget Management

Monitor your delivery expenses and ensure your business profitability.

Dashboards

Take better descision based on real data with state of the art dashboards.

Resources
Tutorials

Video Tutorials that covers every bit of our products.

Blog

Weekly Posts about our products, news, technology and more.

FAQ

List of frequently asked questions about plans, billing, features and more.

Community

Forum to meet, discuss and suggest new features, raise issues, and get answers.

Security Policy

Summary

At Taskeeper, we are committed to ensuring the security and confidentiality of our users' information. This Security Policy outlines the measures we take to protect the data entrusted to us and to maintain the integrity and availability of our systems and services.

Effective: 1 January 2023

Data Protection

We employ industry-standard security measures to protect against unauthorized access, disclosure, alteration, or destruction of personal information.
Access to user data is restricted to authorized personnel who require access to perform their duties.
We regularly review and update our security policies and procedures to adapt to evolving threats and best practices.

Encryption

We use encryption technologies such as SSL/TLS to secure data transmission between users and our servers.
Data stored in our systems is encrypted using strong encryption algorithms to prevent unauthorized access.

Access Control

Access to our systems and databases is limited to authorized individuals and protected by strong authentication mechanisms such as passwords, two-factor authentication, and biometrics.
Access permissions are granted based on the principle of least privilege, ensuring that users only have access to the resources necessary to perform their job functions.

Monitoring and Logging

We employ logging and monitoring systems to track and analyze system activity, including access attempts, changes to data, and security incidents.
These logs are regularly reviewed and analyzed to detect and respond to potential security threats in a timely manner.

Incident Response

In the event of a security incident or data breach, we have established procedures in place to promptly investigate, contain, and mitigate the impact of the incident.
We notify affected users and regulatory authorities as required by law and take appropriate measures to prevent similar incidents in the future.

Training and Awareness

We provide regular training and awareness programs to educate our employees about security best practices, data protection policies, and their role in maintaining a secure environment.
Employees are encouraged to report any security concerns or suspicious activity to our security team for investigation.

Compliance and Certification

We adhere to applicable data protection laws and regulations, including GDPR, CCPA, and other relevant privacy frameworks.
We undergo regular security assessments, audits, and certifications to validate our compliance with industry standards and best practices.

Third-Party Security

We vet and monitor third-party service providers and vendors to ensure they meet our security standards and comply with applicable data protection requirements.
Contracts with third parties include provisions for security and confidentiality to protect the integrity of our users' data.

Continuous Improvement

We are committed to continuous improvement in our security posture and regularly assess and update our security policies, procedures, and technologies to address emerging threats and vulnerabilities.

Contact Us

If you have any questions, concerns, or complaints about this Security Policy or our security practices, please contact us at security@taskeeper.com.

Written Inquiries can be sent to:

Taskeeper Consulting LDA
Rua Sociedade Musical nr 57
Azeitao, Setubal
Portugal