No Compromises on Security

Terms, Policies & Data Security

Data encryption, one-click data purges, and zero third-party sharing. The only guest list we’ll talk about is yours.

Privacy Policy

Your data’s confidentiality, defined.

Terms of Service

Legal terms for scaled use.

Data Processing Agreement

GDPR safeguards for VIP events.

Highest Data Security Standards

Strengthen your Event Compliance with Check-in Pax. We invest heavily in network and application security to make sure your guest data is safe with us.

Hosting on AWS

Check-in Pax utilizes Amazon Web Services (AWS) for robust security and flexibility when scaling up.

Data Deletion

In compliance with GDPR’s ‘right to be forgotten’ principle, we offer the option to purge all your guest list data at any time to ensure the complete removal of personal identifiable information.

Role-based Access Control

Role-based Access Control Grant your team members access based on predefined roles and responsibilities, so you can align with the principle of least privilege.

Data Encryption

All data is stored in an encrypted database at rest (AES-256) and transmitted in transit via SSL/TLS.

99.9 % Uptime

With a 99.9% uptime, we focus on maintaining continuous service without any interruptions for your events. View status page.

Audit Logging

Check-in Pax features audit logs that give admins visibility into user and team activities, including last login, access rights, and guest actions such as creation, modification, and check-in.