Hubstaff Compliance & Data Governance

Organizations in regulated environments need more than time tracking—they need secure and compliant systems to protect sensitive data. This resource outlines Hubstaff’s compliance framework, data governance practices, and configuration options to help teams stay compliant and audit-ready.

No credit card required.

Available for:Apple logoAndroid logo
anti keystroke logging

HIPAA, GDPR, SOC 2 Type II

At Hubstaff, we take security and privacy seriously. Our platform is designed with enterprise-grade teams in mind with industry-leading compliance frameworks to protect sensitive data, like: 

anti keystroke logging

Screenshot and data capture controls

At Hubstaff, our priority is productivity. We’re not interested in collecting personal data, as our goal is to provide customizable permissions for enabling, disabling, blurring, or adjusting the frequency of Apps, URLs, screenshots, and more. Hubstaff does not:

  • Log keystrokes
  • Capture or store typed content
  • Analyze or interpret the contents of screenshots
  • Record audio from microphones
  • Record video from webcams
  • Collect biometric data
Hubstaff free trial
Free download

Master compliance and data governance with Hubstaff

Download PDF
anti keystroke logging

How tracking works: Permissions, roles, and more

Hubstaff's permissions system is based on granular, role-based permissions. Organizations can:

  • Assign predefined roles (such as owner, manager, or member) with different access levels
  • Apply a least-privilege approach, ensuring users only see data required for their role
  • Control visibility of activity levels, screenshots, application and URL data, time entries, and reports

For more details, check out our full guide covering how tracking works.

anti keystroke logging

Audit logs, retention, deletion & export

Hubstaff adheres to enterprise-grade compliance requirements by following data regulation, deletion, and export best practices, and acts as the data controller for employee data collected through the platform.

  • Screenshots and activity. Hubstaff utilizes default retention periods and automatically deletes data once it exceeds the applicable window. 
  • Deletions. Hubstaff users can manually delete various data types (subject to permissions), like time entries, screenshots, and app and URL tracking data. 
  • Data exports. Export data via self-serve UI exports, API access, or custom exports.

Security: Encryption, storage & transfer


Security and reliability are maintained through encryption of time tracking data (including screenshots) during transmission and while stored. Hubstaff implements additional security measures, including access controls, audit/system logs, and backups, as part of its security and reliability practices.

  • Encryption in transit

    Data is transmitted over secure connections using TLS 1.2+.

    Encryption at rest

    Screenshots captured by Hubstaff timer apps are encrypted at rest using AES-256.

    SOC 2 Type II

    Hubstaff maintains SOC 2 Type II compliance, a third-party attestation that demonstrates its operational controls are sufficiently designed and consistently operated over time.

anti keystroke logging

 Offline time tracking (desktop app)

Hubstaff's Help Center notes that the desktop timer app is designed to track time and capture activity while offline, and then upload/sync that locally stored data once a stable connection is available.

Key factual points from the troubleshooting doc:

  • The app can display "Offline" / "Last Update Failed" when it is unable to sync.
  • Time/activity may appear missing during connectivity issues, and then appear after the connection is restored and the app reconnects.
  • VPN/proxy environments may require domain allowlisting for reliable connectivity.

Hubstaff’s Guiding Principles

Frequently Asked Questions

Compliance FAQs

Enterprise-grade time tracking at your fingertips

Protect sensitive data, maintain compliance, and take your business to new heights with Hubstaff.

Try it free for 14 days