Cookies and analytics

GymFlow uses essential site storage and, with your permission, enables analytics on public pages to understand visits and improve the website.

Read cookie notice

Legal and trust

Security and Data Handling

This page describes GymFlow's practical security posture in plain language, including access restriction, hosting, backups, logging, and incident response expectations.

Last updated: 2026-04-21Back to homeLegal center
These public pages describe the GymFlow service at a brand level. The exact contracting entity, pricing, taxes, payment timing, and any market-specific terms will appear in your quote, order form, invoice, or other written agreement and may be updated as the business structure evolves.

Access and authentication

  • GymFlow restricts access to systems and operational data to authorized users and staff with a legitimate need.
  • Account authentication, role boundaries, and audit-oriented records are used to reduce unauthorized access risk.

Hosting, transport, and storage

GymFlow uses hosted infrastructure and supporting service providers to run the platform. Data is intended to move over encrypted connections where supported, and the service relies on cloud security controls and operational hardening appropriate to a growing B2B SaaS platform.

Backups and resilience

GymFlow uses backups, operational logging, and recovery workflows intended to reduce the risk of permanent data loss and improve service recovery after incidents.

No system can guarantee uninterrupted availability or zero-risk storage, but GymFlow aims to operate with commercially reasonable safeguards for the stage and nature of the service.

Incident handling

If GymFlow identifies a material security issue affecting customer data or service integrity, it may investigate, contain, remediate, and notify affected customers as appropriate for the severity of the issue and applicable obligations.