Last updated: November 26, 2025
Flight Crew View (“FCV”) is built by a pilot, for crews, and is a product of Flight Crew Apps, LLC. We protect crew schedules, trip details, messages, and account data with modern security controls and a privacy-first approach.
Our pillars
What we collect & why (high level)
We do not sell personal data and we do not share schedules with advertisers. See the full Privacy Policy for details.
Community airport & hotel info
Quick answers (for crews)
Who can see my schedule? Only you in the app, and those friends and family that you grant access to. Limited support access may occur for troubleshooting, under strict controls.
Can other people see my schedule? Flight Crew View includes an optional Friends feature that lets you share parts of your schedule with specific people you choose. Sharing is opt-in, and you can:
How are passwords handled? For Microsoft (Entra) SSO, you sign in on Microsoft’s pages. For all others, we use Firebase Authentication. We never see your passwords and they are never sent to our servers.
Do you store my Flica password?
If you choose to fetch your schedule by logging into Flica in the app, your credentials are stored only on your device in the secure keystore and sent over TLS to the airline site. Credentials are never sent to FCV servers. For ICS or device-calendar sync, no credentials are stored by FCV.
What if I change airlines or close my account? You can export and then close your account; we remove personal data from active systems per the Privacy Policy.
How do I report a security issue? Email security@flightcrewview.com. See our Vulnerability Disclosure Policy (VDP) and security.txt
Technical details (for airline IT & vendor risk)
1) Authentication (SSO & MFA)
2) Authorization & Tenant Isolation
3) Hosting & Architecture
4) Encryption
5) Network Security (public)
6) Access Control (Internal)
7) Application Security
8) Logging & Monitoring
9) Backups & Disaster Recovery
10) Schedule Sources & Credential Handling
Preferred path: We are moving toward SSO/API, ICS import, and device-calendar sync as airlines modernize access.
How users bring schedules into FCV today (user-chosen):
• Airline portal login (Flica/portal): Some crews choose to sign in to their airline portal inside the app to fetch their schedule. In this flow, credentials are used on the device and stored only in the device’s secure keystore (iOS Keychain / Android Keystore). They are not stored on FCV servers and are sent only to the airline’s site over TLS. You can remove them at any time in Settings.
• ICS file import: Users export an .ics file from their airline system and import it into FCV. No credentials are stored by FCV.
• Device calendar sync (e.g., company app > device calendar > FCV): FCV reads events from the device calendar the user has already synced. No airline credentials are stored by FCV.
Respect for network controls: If access moves inside an intranet/VPN, we do not attempt to bypass those controls. We guide users to ICS import or device-calendar sync, and we prefer SSO/API where available.
11) Data Retention & Deletion
Backups may still contain historic data until they age out; see Privacy Policy for the full language.
12) Third-Party Services (Sub-processors)
12.A) Core infrastructure & security
DigitalOcean
Cloudflare
AWS
12.B) Identity & authentication
Firebase Authentication / Identity Platform (Google)
Customer-controlled IdP (not our sub-processor):
When an airline enables Microsoft Entra (Azure AD) OIDC, the airline is the IdP/controller. We receive ID tokens/claims to authenticate the user; we do not control the airline’s IdP.
12.C) Analytics & error monitoring
Traceability (no PII in vendors): we tag incidents with an internal user ID in our logs for correlation; vendor tools get only pseudonymous IDs.
Firebase Analytics
Google Analytics (website)
Firebase Crashlytics
Sentry
12.D) Support & internal operations
Freshdesk
ClickUp
Slack
Google Workspace
12.E) Developer tooling (no customer data stored)
Github
12.F In-app messaging (Crew Chat) and notifications
Stream (getstream.io)
Firebase Cloud Messaging (FCM)
12.G) Payments & app stores
Apple App Store
Google Play Store
12.H) External aviation & weather data (non-personal)
Server-to-server feeds that do not receive your personal data:
12.I) Notes on retention, regions, and transfers
12.J) Minimizing data in third-party tools
We configure vendors to avoid sensitive data:
13) Aviation & Weather Sources (informational use)
We display aviation and weather information from sources such as FAA SWIFT, FlightAware, NOAA, and Xweather to help crews stay informed. This content is informational only and not for operational decision-making; crews should verify with ATC and their airline’s dispatch/operations. See our Terms and Conditions for details.
14) Compliance & Transfers
15) Incident Response
16) Sensitive Events (Accident/Incident) Handling
When a serious aviation event is credibly reported, Flight Crew View activates a respectful, privacy-preserving response designed to reduce harm and misinformation.
Disclosures & law enforcement
We only disclose data under a valid legal basis (see our Privacy Policy “Requests from an employing airline / legal requests”). Overbroad or informal requests are declined.
Audit & review
All actions are logged. We conduct a post-incident review to improve safeguards and data freshness.
If you have questions about this process, contact security@flightcrewview.com
17) Logbook API & Third-Party Logbook Tools
18. Schedule Sharing (“Friends”) Feature
18) Vulnerability Disclosure (VDP)
19) For Airline IT: SSO Onboarding
20) For Airline IT: Data / Schedule Ingestion Onboarding
SSO authenticates the user; schedule data requires one of the following (chosen with the airline/user):
21) Customer Responsibilities (BYOD)
22) Roadmap / In Progress
23) Contacts
Change Log
2025-11-26: Added information about VDP, “Friends” schedule sharing, FCV Logbook API, Accident/Incident Handling, and how we handle Community airport & hotel info.
2025-11-22: Initial public version