JW Scheduler Congregation Sharing allows you to automatically share and synchronize all JW Scheduler data with other approved brothers in your congregation. Congregation Sharing does not store any confidential or sensitive information online, therefore is fully compliant with sfl. Congregation Sharing is also fully compliant with the strict European GDPR Privacy laws.
Sharing Security and Protection
JW Scheduler takes data security and data protection very seriously and ensures your congregation data is fully secure at all times. We fear Jehovah and would never do anything to misuse or endanger your data.
Congregation Sharing has been designed so that your congregation information can only be accessed by approved brothers in your congregation who are using JW Scheduler and know your sharing password.
This is no way anyone else can ever see your congregation data, including JW Scheduler support or programmers.
Two-Factor Authentication (2FA)
For added security, Congregation Sharing uses Two-Factor Authentication (2FA). This means in additional to knowing the Sharing Region, Congregation ID and Congregation Sharing Password, a members Email address is also used to identify and verify they are allowed to connect to the congregation.
A Congregation Administrator will create the Member record, then enter the members Email. Finally, they add the member to Congregation Sharing as a Shared Member.
Other appointed brothers connect using a 3-step process:
- Connect. The brother must have the correct Sharing Region, Congregation ID and Congregation Sharing Password to connect to your Congregation.
- Identify. They must use their Email to Identify who they are. This must exactly match their Member record.
- Verify. Their computer must be Verified with a Verification Code sent to their Email.
This is very similar to the security of jwpub.org and is an extremely secure system.
Security Best Practise
Congregation Sharing implements the following best-practise security processes:
- JW Scheduler uses data obfuscation techniques to ensure any transferred data is meaningless unless viewed inside JW Scheduler.
- JW Scheduler uses end-to-end encryption, which means your data is fully secured before it is transferred to other appointed brothers and cannot be opened by anyone outside your congregation.
- JW Scheduler uses 256-bit Encryption Keys uniquely generated by your local computer using your congregation Sharing Password. This means your local data is converted to randomised and meaningless strings before ever leaving your computer.
- JW Scheduler developers or support personnel do not and can not access your encryption keys. It is therefore physically impossible for them to decrypt, view, see or edit your data under any circumstances.
- Data transfer uses HTTPS connections, so it is additionally encrypted on the transport layer (known as TLS).
- The only “data” that ever leaves your local computer is a randomised and meaningless string of characters.
- Our sharing transfer servers are fully secured by your Congregation ID, Congregation Sharing Password and 2-Factor Authentication. This only allowing your approved congregation members to transfer the randomised strings to other congregation members.
- If you Disable Sharing, the meaningless encrypted strings are immediately and permanently removed from the sharing server.
Sharing Data using Email
Some software programs and even some brothers recommend using Email or Mail Servers to share data. Brothers will send a ‘Data Exchange’ file or similar file via Email to share and synchronise congregation or member data.
Using Email or a Mail Server to transfer data is extremely insecure. In fact, it is one of the least secure methods. We strongly recommend against using Email or a Mail Server to share data files, for at least the following reasons:
- Email and a Mail Server is almost always not encrypted. All data is freely viewable.
- For example, Gmail, Hotmail, Outlook etc do not use encryption
- Email is by default sent from server to server in clear text that can be read by anyone while in transit.
- Mail Server data can be easily accessed by any Server Admin, at any time.
- For example: Gmail, Hotmail, Outlook have thousands of Server Admins that can access this data.
- Email and Mail Server data is usually permanently kept on a mail server, even if you remember to click Delete.
- For example: Most large companies have data retention policies that require keeping data for many years.
- Most Email and Mail Servers have built-in “backdoor access” for government agencies. This means they can very easily access any data at any time.
- For example, google Edward Snowden.
“Email by default is not and was never intended to be a secure mechanism for sending data,” says Dr. Catherine J. Ullman, Senior Information Security Analyst for UB. “Although you need credentials to log in and access the e-mail in your mailbox, email is by default sent from server to server in clear text that can be read by anyone while in transit.”
JW Scheduler does not use Email or a Mail Server to share or transfer data. We use a far more secure method.
How does JW Scheduler Sharing work?
Here is a real-world example of how Congregation Sharing works:
- Elder A opens JW Scheduler on his own computer and schedules a Christian Life and Ministry Meeting part.
- Your local JW Scheduler obfuscates the data so it has no meaning outside of JW Scheduler.
- JW Scheduler encrypts the obfuscated data using a unique encryption key generated by your own computer. This creates a set of seemingly random and meaningless strings.
- JW Scheduler creates a secure connection to your selected transfer server.
- JW Scheduler uploads these randomised strings to your secured congregation folder on the transfer server.
- Elder B opens JW Scheduler on his computer. His computer authenticates with the transfer server using the Congregation ID, Congregation Password and his Member PIN.
- If authenticated, his computer creates a secure connection to your congregation folder and checks for any updated strings.
- If any updated strings are detected, they are retrieved from the JW Scheduler transfer server.
- JW Scheduler uses his unique locally generated encryption key to decrypt the randomised strings.
- JW Scheduler interprets the data converting it back into meaningful information.