Skip to main content. Skip to chat with us.

We take great care of your data.

Your information is personal. That’s why we protect it with a comprehensive security infrastructure and stringent data policies. When you choose to use our services, you can trust your data is kept safe, secure and private.

  • All customer data on Maple is stored in a Canadian data centre.
  • We protect your data with multiple layers of security, including leading 256-bit AES encryption technology.
  • We frequently test our software and servers for security and quality.

Consultations through Maple are completely private and safe. You have full ownership and control over your information. Only you decide how you want to share it with your doctor, and with us.

We ask for your data in order to make our services more helpful to you. Our Privacy Policy describes our commitments to your privacy and security. We want you to understand how your data may be collected and used, and how you can control and manage your privacy.

We’re dedicated to protecting your privacy.

We are committed to complying with our Privacy Policy and with applicable Canadian Provincial and Federal privacy legislation. Our Privacy Policy summarizes how Maple collects, uses, discloses, retains, disposes of, and protects personal health information in the course of providing our services.

We’ll help you safeguard your account.

Create a strong and unique password.

Our password strength estimator will help you craft a unique and private password to keep your account safe.

Use our two-factor authentication feature.

You can enable this extra layer of security in your Account Settings to further protect against unauthorized access to your account.

Keep an eye on your account activity.

You can easily monitor the security of your account by checking activity logs in your Account Settings.

Vulnerability Disclosure

To report a vulnerability, or if you have a security concern with Maple, please contact

Please include a proof-of-concept, tools used, and recreation steps in your report. We'll make every effort to quickly respond and resolve the issue.

We may pay a bug bounty for reports we determine are critical from pre-approved security researchers. If you would like to scan our systems with the goal of collecting a bounty, contact us for approval before beginning your tests. We will not pay a bounty to unapproved security researchers.