No storing, third-party selling, or snooping on data; no tracking or spam.
Keep your confidential communications safe with RealTyme secure collaboration suite.
RealTyme requires minimal personal information (username and an email or phone number) to be part of the system. This minimal information is only used for initial onboarding and basic features (e.g. account recovery).
There is no automatic contact syncing with the phone’s already existing cluttered address book. Contacts are invited privately into circles by existing RealTyme users or centrally by the administrators (available for enterprise customers only).
Contact lists are formed in an organised way in the form of private circles via invitation. Communication happens only within circles to avoid spam from unknown people. Everyone can see each other RealTyme member in a circle.
Messages and files shared between the users are deleted immediately on RealTyme servers after being delivered to the intended recipients. They are stored for a maximum of one month awaiting to be delivered.
For a more reduced digital footprint and higher security, we provide ways to automatically delete application data on the end devices: messages, files, call and invitation history can be removed after a configurable time.
Our business model is based on a paid subscription. We do not log, store, analyze or sell user data or metadata. There are no general-purpose ads, targeted ads or data-driven economics in our model.
RealTyme can be deployed fully on a private cloud or on-premises for better control and privacy. Our solution provides total data and communication sovereignty for organizations respecting their internal IT policies.
Users have numerous options within the application to control their privacy settings; organizations can enjoy a higher central control from the administrative portal to enforce policies on the applications.
Pseudonymized server and applications logs are kept for a limited time only to improve service quality and troubleshooting. Application logs stay on the device unless the users manually share them with administrators.