Last updated: December 9, 2025
Flight Crew View (“FCV”) is built by a pilot, for crews, and is a product of Flight Crew Apps, LLC. We protect crew schedules, trip details, messages, and account data with modern security controls and a privacy-first approach.
Security Program Overview
Flight Crew View operates a security program designed to protect the confidentiality, integrity, and availability of customer data. Our approach is risk-based and tailored to a small SaaS platform that processes sensitive crew schedule, trip, and layover information. We design our controls with an understanding that time- and location-based data can present elevated personal safety, privacy, and employment-related risks.
Our security program is built around clear accountability, logical separation between tenants, least-privilege access to systems and data, encryption in transit and at rest, monitoring of systems and access, and documented procedures for incident response, onboarding, and offboarding. We aim to collect and retain only the data required to provide Flight Crew View’s features, and we restrict internal access to customer data to legitimate operational, support, or security purposes.
While Flight Crew View does not currently maintain a SOC 2 or ISO 27001 certification, we align our practices with widely accepted security principles reflected in those frameworks. We continuously review and improve our controls as our product, customer base, and regulatory expectations evolve.
Our pillars
Security Governance & Access Management
Security ownership
Security at Flight Crew View is owned by the company’s founder and principal engineer. Security responsibilities include application security, infrastructure protection, incident response, and oversight of internal access to user data. Our security program is designed to be appropriate for a small SaaS platform handling sensitive crew schedule and trip data, and is continuously refined as the product and customer base grow.
Team roles & production access
Flight Crew View intentionally operates with a small team. Access to production systems and user data is tightly restricted and granted only where necessary to perform specific job functions.
Where support or debugging requires access to real user data, access is granted on a temporary, ticket-specific basis, limited to the minimum data required, and revoked once the task is complete.
Least privilege & access reviews
We apply the principle of least privilege to all internal roles.
Onboarding & offboarding
Flight Crew View maintains written onboarding and offboarding procedures for roles that interact with internal systems or customer data. These procedures cover:
Confidentiality & data handling obligations
All staff and contractors with access to user data are bound by confidentiality obligations, including contractual confidentiality terms and non-disclosure agreements where applicable. Internal access to user schedules and trip data is permitted solely for legitimate operational, support, or security purposes.
Safeguards against misuse
Using Flight Crew View to stalk, harass, intimidate, or improperly monitor individuals is strictly prohibited and violates our Terms of Service. We investigate reports of misuse and may take actions such as access revocation, account suspension, or other remedial measures where appropriate.
Crew schedule, trip, and layover data is treated as sensitive personal data, and access to it is restricted accordingly.
What we collect & why (high level)
We do not sell personal data and we do not share schedules with advertisers. See the full Privacy Policy for details.
Community airport & hotel info
Quick answers (for crews)
Who can see my schedule? Only you in the app, and those friends and family that you grant access to. Limited support access may occur for troubleshooting, under strict controls.
Can other people see my schedule? Flight Crew View includes an optional Friends feature that lets you share parts of your schedule with specific people you choose. Sharing is opt-in, and you can:
How are passwords handled? For Microsoft (Entra) SSO, you sign in on Microsoft’s pages. For all others, we use Firebase Authentication. We never see your passwords and they are never sent to our servers.
Do you store my Flica password?
If you choose to fetch your schedule by logging into Flica in the app, your credentials are stored only on your device in the secure keystore and sent over TLS to the airline site. Credentials are never sent to FCV servers. For ICS or device-calendar sync, no credentials are stored by FCV.
What if I change airlines or close my account? You can export and then close your account; we remove personal data from active systems per the Privacy Policy.
How do I report a security issue? Email security@flightcrewview.com. See our Vulnerability Disclosure Policy (VDP) and security.txt
Technical details (for airline IT & vendor risk)
1) Authentication (SSO & MFA)
2) Authorization & Tenant Isolation
3) Hosting & Architecture
4) Encryption
5) Network Security (public)
6) Access Control (Internal)
7) Application Security
8) Logging & Monitoring
9) Availability, Backups & Disaster Recovery
10) Schedule Sources & Credential Handling
Preferred path: We are moving toward SSO/API, ICS import, and device-calendar sync as airlines modernize access.
How users bring schedules into FCV today (user-chosen):
• Airline portal login (Flica/portal): Some crews choose to sign in to their airline portal inside the app to fetch their schedule. In this flow, credentials are used on the device and stored only in the device’s secure keystore (iOS Keychain / Android Keystore). They are not stored on FCV servers and are sent only to the airline’s site over TLS. You can remove them at any time in Settings.
• ICS file import: Users export an .ics file from their airline system and import it into FCV. No credentials are stored by FCV.
• Device calendar sync (e.g., company app > device calendar > FCV): FCV reads events from the device calendar the user has already synced. No airline credentials are stored by FCV.
Respect for network controls: If access moves inside an intranet/VPN, we do not attempt to bypass those controls. We guide users to ICS import or device-calendar sync, and we prefer SSO/API where available.
11) Data Retention & Deletion
Backups may still contain historic data until they age out; see Privacy Policy for the full language.
12) Third-Party Services (Sub-processors)
12.A) Core infrastructure & security
DigitalOcean
Cloudflare
AWS
12.B) Identity & authentication
Firebase Authentication / Identity Platform (Google)
Customer-controlled IdP (not our sub-processor):
When an airline enables Microsoft Entra (Azure AD) OIDC, the airline is the IdP/controller. We receive ID tokens/claims to authenticate the user; we do not control the airline’s IdP.
12.C) Analytics & error monitoring
Traceability (no PII in vendors): we tag incidents with an internal user ID in our logs for correlation; vendor tools get only pseudonymous IDs.
Firebase Analytics
Google Analytics (website)
Firebase Crashlytics
Sentry
12.D) Support & internal operations
Freshdesk
ClickUp
Slack
Google Workspace
12.E) Developer tooling (no customer data stored)
Github
12.F In-app messaging (Crew Chat) and notifications
Stream (getstream.io)
Firebase Cloud Messaging (FCM)
12.G) Payments & app stores
Apple App Store
Google Play Store
12.H) External aviation & weather data (non-personal)
Server-to-server feeds that do not receive your personal data:
12.I) Notes on retention, regions, and transfers
12.J) Minimizing data in third-party tools
We configure vendors to avoid sensitive data:
13) Aviation & Weather Sources (informational use)
We display aviation and weather information from sources such as FAA SWIFT, FlightAware, NOAA, and Xweather to help crews stay informed. This content is informational only and not for operational decision-making; crews should verify with ATC and their airline’s dispatch/operations. See our Terms and Conditions for details.
14) Compliance & Transfers
15) Incident Response
16) Sensitive Events (Accident/Incident) Handling
When a serious aviation event is credibly reported, Flight Crew View activates a respectful, privacy-preserving response designed to reduce harm and misinformation.
Audit & review
All actions are logged. We conduct a post-incident review to improve safeguards and data freshness.
If you have questions about this process, contact security@flightcrewview.com
17) Disclosures & law enforcement
We only disclose data under a valid legal basis (see our Privacy Policy “Requests from an employing airline / legal requests”). Overbroad or informal requests are declined. We do not provide bulk schedule exports or monitoring feeds to employers or employee groups/unions for generalized employee surveillance, monitoring, or union-related targeting.
18) Logbook API & Third-Party Logbook Tools
19) Schedule Sharing (“Friends”) Feature
20) Vulnerability Disclosure (VDP)
21) For Airline IT: SSO Onboarding
22) For Airline IT: Data / Schedule Ingestion Onboarding
SSO authenticates the user; schedule data requires one of the following (chosen with the airline/user):
23) Customer Responsibilities (BYOD)
24) Roadmap / In Progress
23) Contacts
Change Log
2025-12-09: Added Security Program Overview and Security Governance & Access Management sections.
2025-11-26: Added information about VDP, “Friends” schedule sharing, FCV Logbook API, Accident/Incident Handling, and how we handle Community airport & hotel info.
2025-11-22: Initial public version