Keeping your data secure and readily accessible are our greatest priorities. We accomplish this by using a 360-degree approach. This includes everything from the most advanced security protocols and hacker safeguards to multiple structural failsafes (also known as redundancies) that defend our data centers against natural occurring events.

While no system can guard against every potential hazard, Mindbody’s defensive line is markedly advanced and monitored 24/7, 365 days a year by skilled, highly trained professionals. If you have questions about Mindbody’s security, please email us at [email protected].

  • Secure Data Centers

    Mindbody co-locates with secure, Tier 4 data centers in Irvine, California, and Las Vegas, Nevada. Each data center is monitored 24/7, 365 days a year by skilled and experienced IT professionals.

    • SSAE Type II and Type III compliant
    • Zone 4 earthquake-rated reinforced structure
    • Monitoring system providing real-time data on equipment operation, enabling instant identification of problems
    • Multiple paralleled N+1 UPS modules configured in redundant systems to allow for A/B power configuration
    • Twenty megawatts of expandable N+1 power backup utilizing generators
    • A Very Early Smoke Detection Alarm (VESDA) with pre-action dry pipe fire suppression systems
    • Multiple fiber route entrances to structures
    • Access control systems (biometric scans and Personal Identification Number (PIN) access) with separate locks for each Mindbody server cabinet

    Network Protection

    Mindbody’s networks are monitored to protect our perimeter against potential threats. Possible threats include hackers, data breaches, adware, spyware, pop-ups, browser exploits and phishing attempts.

    • All secure servers are protected by layer 7 firewalls, best-of-class router technology, TLS encryption, file integrity monitoring and network intrusion detection that identifies malicious traffic and network attacks. Network security scanning helps us quickly identify out-of-compliance systems.
    • All networks are monitored using a Security Incident Event Management (SIEM) system that gathers logs from all network systems and creates alert triggers based on correlated events.
    • In addition to our own capabilities, and those of our hosting providers, we contract with on-demand Distributed Denial of Service (DDoS) scrubbing providers that allow us to mitigate DDoS attacks.
    • Intrusion detection sensors throughout our internal network report events to the SIEM system for logging, alerts and reports.

    Disaster Recovery (DR)

    To ensure availability of our systems should we encounter a serious problem at our primary data center, we engineered a DR data center where we regularly run tests.

    • The DR data center is located in a state other than MINDBODY headquarters with Internet access and power that would be unaffected if a catastrophic event were to strike California.
    • We perform real-time file replication to disk at each data center, and near real-time data replication between the production data center and the disaster recovery center.
    • Disaster recovery tests verify our projected recovery times and the integrity of customer data.
    • Our design provides the ability to rapidly restore all Mindbody services, should a catastrophic loss occur.

    Vulnerability Analysis and Reporting

    Mindbody and its supporting data security infrastructure are frequently reviewed for potentially harmful vulnerabilities.

    • We use industry-recognized, third-party security specialists, enterprise-class security solutions, and custom in-house tools to regularly analyze the application and production infrastructure to ensure that all vulnerabilities are identified and swiftly mitigated.
    • We employ a number of third-party, qualified security tools to provide both regular dynamic scanning of our application and continuous static analysis of our codebase.
    • A third-party service provider continuously scans the network externally and alerts us of changes in our baseline configuration.

    Cybersecurity Program Details

    The focus of Mindbody’s cybersecurity program is to prevent unauthorized access to customer data. Our cybersecurity team partners with peers across the company to identify and mitigate risks, implement best practices, and continuously develop ways to improve.

    Read our white paper to find out how we work around the clock to keep your data safe through:

    • Software Security by Design
    • Data Encryption
    • Network Protection
    • Endpoint Security
    • User Security
    • Access Control
    • System Monitoring, Logging, and Alerting
    • Vendor Management
    • Security Compliance Audits and Assessments
    • Penetration Testing
  • Secure Transmission and Sessions

    We use Transport Layer Security (TLS), a form of data encryption, to ensure the privacy of all Internet communications.

    • Individual user sessions are identified by a unique username at login
    • Multiple layers of monitoring devices, including Web Application Firewall (WAF)
    • Intrusion Prevention System capabilities

    PCI-DSS & HIPAA Compliance

    We take security seriously, which is why our existing network protocols exceed the highest level’s standards: PCI DSS, Tier 1. To maintain our PCI Level 1 certification, Mindbody undergoes an annual audit. Mindbody also performs an annual HIPAA risk assessment that is analyzed and approved by the HITRUST CSF Assurance Program.

    We are dedicated to the six best security practices for the protection of electronic protected health information (ePHI) and credit card data, which include, but are not limited to:

    1. Maintaining a secure network
    2. Encrypting and protecting ePHI and cardholder data
    3. Maintaining a Vulnerability Management Program
    4. Implementing strong access control measures
    5. Monitoring and testing production and development networks
    6. Maintaining an information security program and policies

    Learn more on how we validate our PCI compliance with VISA.

    Detailed PCI Responsibility Matrix

    Data Backups

    Mindbody works to backup subscriber data in multiple ways to protect from any potential data loss or corruption. Each backup is stored on a secure and encrypted server.

    • All client data is stored on a secure server or backup directory that requires access authentication.
    • Each client’s information is stored on its own designated database which is backed up to protect against accidental or malicious data deletion or corruption.
    • To protect against data loss, snapshots of all subscriber data are made at 15-minute intervals. Archival backups of all subscriber databases are also made daily and monthly, and are retained for 30 days and 13 months, respectively.

    Incident and Breach Notification

    Content regarding Mindbody’s lines of defense is well documented and made available to our clients upon request.

    • Mindbody maintains runbooks on how to respond to system alerts and events, including security events.
    • A Crisis Communications Plan is maintained companywide that includes instructions on how to notify customers, should a large-scale event occur.
    • Any confirmed, unauthorized access resulting in compromised data launches an Incident Response Team that utilizes a defined and audited notification process.
    • Mindbody generates an ePHI and Credit Card Breach Report with all of the available facts regarding the scope of the breach in compliance with PCI-DSS and HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414.


    The EU General Data Protection Regulation (GDPR) is a comprehensive data protection law designed to strengthen and unify data protection for individuals within the EU, essentially giving EU residents and citizens more control of their personal data. The GDPR took effect on May 25, 2018.

    This law impacts any organization with a presence in an EU country, or any company that processes personal data of EU residents and citizens.

    Mindbody has worked hard to ensure that our practices are GDPR compliant. It is equally important that you, our customers and partners, understand what the GDPR means to you and your business so you can ensure your own processes are compliant as they relate to data protection and the new regulations.

    Our FAQ sheet provides answers to questions many of you may have about the GDPR.

View our security policy for more information.