Data Integrity & Security
Last updated: Mon Jan 26 2026
Purpose
This page explains how we approach data accuracy, availability, backups, offline storage, and security for Itinerary Builder.
Data Accuracy and Integrity
The Service depends on:
- Information you provide (itinerary entries, preferences)
- Data from third parties (maps, places, booking partners)
As a result:
- Some information may be inaccurate, incomplete, or outdated.
- We do not guarantee correctness of third-party content.
- You should review and verify critical travel details.
Backups, Availability, and Offline Use
- We use standard hosting practices and backups designed to reduce data loss.
- The Service may experience interruptions, maintenance windows, or outages.
- Offline access stores a limited subset of your data on your device.
Offline storage notes
- Offline data can become stale.
- Anyone with access to your unlocked device may be able to view offline content.
- Use device-level security (passcode/biometrics) and log out on shared devices.
Security Measures
We use safeguards designed to protect data, such as:
- Encryption in transit (TLS)
- Access controls and least-privilege practices
- Monitoring and abuse prevention
- Vendor risk considerations for major providers
No system is perfectly secure. You play a role by using strong passwords and keeping your device/software updated.
Incident Response and Notifications
If we become aware of a security incident that compromises personal data, we intend to:
- Investigate and take reasonable steps to contain and remediate
- Notify affected users and/or regulators as required by applicable law and available contact information
Data Deletion and Export
- You may request deletion of your account and associated data (subject to legal/security retention).
- Export features (when available) provide snapshots and may not reflect later changes.
Reporting Security Issues
If you believe you found a vulnerability, report it to support@itinerarybuilder.in with details to help us reproduce the issue. Please avoid actions that could degrade the Service or compromise other users.