Give clients the tools, structure, and support they need to stay motivated, take action, and achieve lasting results.
Built for Trust, Backed by Technology
At Taskey, we know that protecting client privacy isn’t just a technical requirement — it’s a core part of the trust between professionals and the people they support. That’s why Taskey is built from the ground up with secure architecture, end-to-end encryption, and privacy-by-design principles.
Data Encryption – at Rest and in Transit
All data shared through Taskey — videos, tasks, notes, or messages — is protected by AES-256 encryption at rest and TLS 1.3 encryption in transit. That means your content is encrypted when it’s stored, and again when it’s moving between devices — ensuring it can’t be intercepted or accessed by unauthorised users.
Task Locking for Client Privacy
Taskey’s unique Task Locking feature allows practitioners to keep sensitive or personal client tasks private and visible only to the intended recipient. This ensures you cannot accidentally share video or images of a client - so that each client’s content remains confidential and secure — empowering therapists, coaches, and educators to maintain full control over access and visibility.
Privacy-by-Design
Taskey follows privacy-by-design principles, meaning user protection is embedded in every stage of product development - from how much data we collect and store to the secure cloud it's stored on. Importantly, Taskey doesn't perform unnecessary tracking — just a clear focus on confidentiality, transparency, and user control.
Compliant and responsible
Taskey’s security framework aligns with leading data protection standards including GDPR and Australian Privacy Principles (APPs). Our systems are hosted on trusted, secure infrastructure, with continuous monitoring and update protocols to maintain high levels of protection.
Why it matters
When therapists, coaches, and families share personal content, they deserve to know it’s safe.
With Taskey, you can focus on what really matters: helping clients progress, knowing their privacy is protected.
In Summary
- AES-256 encryption (data at rest)
- TLS 1.3 encryption (data in transit)
- Task Locking to protect client-specific content
- Privacy-by-design architecture
- GDPR and APPs alignment