The Family App

Security

Stretch takes security very seriously. Every Stretch family knows that their data is secure and only available to designated family members.  It will never be shared with a third party.

Stretch Technologies uses Stretch to communicate and organize our sensitive information.  Team members at Stretch (yes, businesses use Stretch!) can access online account information, asset information, files, contacts, key events, checklists, financials and much more.  We are uber-sensitive to security, not only for ourselves but for all Stretch families.

Key Aspects of Stretch Security

Physical Location

Like many Internet companies our servers are located in Amazon's AWS data centers.  Amazon is the world leader in secure private cloud infrastructure.  You can read about their own policies here.

Stretch uses Amazon's Virtual Private Cloud to add further layers of security for the servers and access to them. Using AWS's security best practices, Stretch uses as many safeguards as possible to prevent data access and theft.

Encrypted traffic

Stretch uses industry standard encryption to protect your data in transit. This is commonly referred to as transport layer security (“TLS”) or secure socket layer (“SSL”) technology.

Team

Stretch's founding team has many decades of Internet and enterprise software expertise.  Past successes include workforce management, HR, payroll, and supply chain applications that managed hundreds of millions of data points and processed billions of dollars of transactions.

Encryption

Stretch uses Amazon's AWS Key Management Service (KMS) for encrypting certain data points at rest in the database, such as Account Details (Username, Password, Account #, PIN).  The Master Encryption Keys are managed by AWS KMS, which uses Hardware Security Modules (HSMs) to secure these keys and ensure that the plaint-text master keys are never stored on disk or in memory and limits which systems can access the keys.  What this means is that even people who have database access (such as Stretch Administrators) cannot access this information.

External Security Audits

We contract with a widely respected, external security firm who perform regular audits of Stretch to verify that our security practices are sound and performs quarterly penetration tests to ensure our product remains secure.

Confidentiality

All the information in Stretch belongs to the families who subscribe and use Stretch.  This information is private and confidential and we place strict controls over our own employees' access to information.

If you have any questions about security or privacy please don't hesitate to email us at support@getstretch.co and someone will respond to you.

Families & Stretch

For Families
Download the iOS App

The calendar alone makes Stretch the most important thing on my phone. For the first time ever, I always know who's picking who up, and who's going where, when. Stretch has turned our family chaos into a smooth-running machine.

– Nancy Haas of The Roe-Haas Family 3

I love software and have been searching for something like Stretch for a long time. I think every family really is wanting the product they’ve made.

– Remington Robertson