Quick Navigation

1. Our Commitment

We take data security seriously and have procedures in place to respond quickly if any part of our infrastructure is ever compromised. This plan outlines what we would do and what you should know.

Important context: SteadiDay stores all your personal data — medications, tasks, contacts, health data, and settings — on your device, not on our servers. This means that a breach of our infrastructure would not expose your personal health information, medication details, or other app data. See Section 2 for details on what our infrastructure does and does not contain.

2. Our Architecture

Understanding what we do and don't have access to is important context for any security incident:

Because of this architecture, the scope of any potential breach is limited to the data described above — not your personal health or wellness information.

3. What Could Be Affected

In the event of a security incident involving our infrastructure, the following data could potentially be affected:

The following data could NOT be affected by a breach of our infrastructure because we do not have it:

4. Detection and Assessment

We monitor our systems for security issues. If we detect unauthorized access or a potential breach, our team immediately:

5. Immediate Response (First 24 Hours)

6. User Notification

If a security incident could affect you, we will notify you within 72 hours through our website and in-app notification. We will explain:

Note: Because SteadiDay does not require an account and we do not have your email address (unless you submitted our website contact form), our primary notification method is through the app itself and our website. We recommend checking steadiday.com/security.html periodically or following our updates.

7. Health Data Protection

Health data accessed through Apple Health (iOS) or Health Connect (Android) is stored locally on your device and protected by your operating system's security architecture.

In the event of a breach of our infrastructure, your health data remains secure on your device because it was never transmitted to or stored on our servers. This includes steps, heart rate, sleep data, exercise minutes, and any other health metrics synced from your device's health platform.

8. Your Steps After an Incident

Because SteadiDay does not use accounts or passwords, the typical breach response steps (changing passwords, enabling two-factor authentication) do not apply. However, if we notify you of an incident:

9. Law Enforcement and Regulators

For serious breaches, we will notify law enforcement and relevant regulatory authorities as required by law. We cooperate fully with investigations to identify and prosecute attackers.

10. Prevention Measures

After any incident, we review and improve our security measures. We conduct post-incident analysis, update security protocols, and implement additional safeguards to prevent future breaches.

Our ongoing security practices include:

11. Questions or Concerns

If you believe you've received a suspicious message claiming to be from SteadiDay, or if you have any security concerns, contact us immediately through the Feedback feature in the app or through our website contact form.