JW Scheduler Security and Privacy

JW Scheduler takes data privacy and security very seriously. We feel that your member and congregation data is yours, and should be fully secure at all times.

We also understand we are living in critical times, and soon the Great Tribulation will arrive.

Data Security

JW Scheduler fully complies with the data storage requirements of sfl.

JW Scheduler

JW Scheduler implements the following security best-practises:

  1. All data is stored on your local computer, under your User Profile folder, meaning other users of your computer can’t access it.
    • Note: The exact folder is C:\Users\[USERNAME]\AppData\Local\JW Scheduler
  2. All data is always encrypted, both when the program is open and closed.
    • Note: JW Scheduler uses a 128-bit key, CipherMode CBC and PaddingMode PKCS7.
  3. JW Scheduler can be password protected.
  4. All Backup Files are encrypted and password protected.
  5. JW Scheduler developers, admins and support personnel cannot view or edit any of your congregation or member data, at any time, under any circumstances.

Appointed Brothers

We also recommend all appointed brothers implement the following security practices:

  1. Ensure you are using the latest version of Windows and have all the latest Windows Updates installed.
  2. Ensure your Firewall and Anti-virus software is enabled and up-to-date.
    • Note: We strongly recommend using the free in-built Windows 10 Anti-virus and Firewall software.
  3. Ensure your Windows Login is password protected.
  4. Choose long and secure passwords for your computer, emails and JW Scheduler.
  5. Enable Windows BitLocker.
  6. Keep all external hard drives and USB drives safe and secure.
  7. Keep all printouts or documents well organised in a safe and secure location.

Congregation Sharing

Two-Factor Authentication (2FA)

For added security, Congregation Sharing uses Two-Factor Authentication (2FA). This means in addition to knowing the Sharing Region, Congregation ID and Congregation Sharing Password, a members Email address is also used to identify and verify they are allowed to connect to the congregation.

Data Security

Congregation Sharing implements the following best-practise security processes:

  1. JW Scheduler uses data obfuscation techniques to ensure any transferred data is meaningless unless viewed inside JW Scheduler.
  2. JW Scheduler uses end-to-end encryption, which means your data is fully secured before it is transferred to other appointed brothers and cannot be opened by anyone outside your congregation.
  3. JW Scheduler uses 256-bit Encryption Keys uniquely generated by your local computer using your congregation Sharing Password. This means your local data is converted to randomised and meaningless strings before ever leaving your computer.
  4. JW Scheduler developers or support personnel do not and can not access your encryption keys. It is therefore physically impossible for them to decrypt, view, see or edit your data under any circumstances.


  1. Only your first name and email are required when using JW Scheduler.
  2. We do not collect personal information for advertising, tracking or any other purpose.
  3. We have a very strict and comprehensive Privacy Policy, that is very similar to jw.org.
Scroll to Top