Orchedule™ is built with security, privacy, and reliability at its core. Here you'll find a transparent account of how we protect your institution's data, uphold your privacy, and keep the platform dependable.
Security is an architectural requirement, not an add-on. Every component of Orchedule™ is designed to protect institution data against modern threats.
Every institution that subscribes to Orchedule™ operates in a completely isolated PostgreSQL schema — a separate database namespace that is structurally incapable of sharing rows with any other institution. This is not a row-filter or a permission guard; it is a hard architectural boundary enforced at the database engine level.
All data exchanged between your browser and Orchedule™ is encrypted using TLS 1.2 / TLS 1.3. Plain-text HTTP is rejected in production.
Sensitive fields — including SIS credentials and integration tokens — are encrypted using Fernet symmetric encryption before being stored.
Two access tiers keep permissions minimal by design. Admin & Registrar users have institution-level access. Basic users are scoped to a single academic unit (Department, Program, or Track) — they cannot see or modify anything outside it.
Django's CSRF middleware protects every state-changing request with a validated token. Django's template engine auto-escapes all output, preventing cross-site scripting by default.
A custom ScannerBlockMiddleware runs at the very front of the
middleware stack, dropping automated exploit probes before they reach
any application logic.
Cross-origin requests are restricted to an explicit allowlist of trusted origins. No wildcard origins are permitted, limiting exposure to cross-site request forgery from unknown domains.
We collect only what is necessary to run the platform and never sell or share institution data with third parties for commercial purposes.
We collect only the data required to deliver the service. No behavioral tracking for advertising.
Your institution owns its data. You can request a full export or deletion at any time.
Scheduling data is retained while your subscription is active. Post-termination data is purged within 90 days upon request.
Infrastructure is hosted on Render (cloud PaaS). Email is handled by a dedicated private mail server. No data is sold to third parties.
Academic scheduling has hard deadlines. We engineer for the availability and performance your institution can depend on.
We welcome responsible security research. If you've discovered a potential security issue in Orchedule™, please report it privately so we can address it before it affects our users.
Email your findings to support@orchedule.com with a clear description of the vulnerability, steps to reproduce, and the potential impact. We aim to acknowledge reports within 3 business days.
Please do not publicly disclose the vulnerability until we have had a reasonable opportunity to resolve it (typically 90 days).
For security reports, privacy questions, or any trust-related inquiries, reach us directly:
support@orchedule.com