We provide technology and support so you don't have to
Your Data is Secure
Your email subscribers
Your subscriber lists are stored on a secure server. We don’t, under any circumstances, contact your subscribers or sell your subscriber data. If someone on your subscriber list complains or contacts us, we might then contact you to contact that person to resolve the issue. Only authorized employees have access to view your subscriber data. You may export (download) your subscriber data from FlyEasy at any time. We will not use and disclose the information in your subscriber list to bill or collect money owed to us, send you system alert messages, communicate with you about your account, or send you informational and promotional content. If we detect abusive or illegal behaviour related to your subscriber list, we may share your subscriber list or portions of it with affected ISPs or anti-spam organizations.
Secure Socket Layer Encryption
We make sure all information travelling between your browser and the FlyEasy platform is protected from eavesdroppers with 256-bit SSL encryption. The lock icon in your browser lets you verify that you aren’t talking to a phishing site impersonating FlyEasy and that your data is secure in transit.
Solid and Safe Infrastructure
We use Linode as our cloud server provider that hosts all our client’s data and server-side requests. Linode is committed to ensuring the security of their infrastructure and their users' data. Each of the facilities Linode co-locates with enforces multiple layers of security via a variety of technological and human measures. Beyond that, all Linode’s equipment is in locked cages. In addition, Linode enforces strict filtering rules to ensure that servers can only communicate using their allowed IP addresses. This prevents servers from spoofing other servers’ IPs or performing man-in-the-middle attacks on the Linode private network. Linode servers themselves operate within Xen virtualization, which ensures that each server has its own kernel and userspace, which are fully separate from other servers. This ensures that a malicious server cannot access either the host itself or other servers’ resources.