Everything included
Every feature.
No hidden extras.
Here's the full breakdown of what ServioCS includes — from the core tools every restaurant needs to the advanced add-ons for growing operations.
GPS Geofencing
Set a radius around your location. Staff can only clock in when they're physically on-site. Out-of-range punches are flagged automatically.
QR Code Clock-In
Print a QR code for your entrance. Staff scan it to clock in — no app download, no PIN required at the door.
PIN-Based Login
Staff log in with a 4-digit PIN from any browser. No email, no password reset headaches.
Auto Clock-Out Reminders
Automatically remind staff who forget to clock out. Configurable reminder window per location.
IP Logging
Every punch is logged with IP address and device info for full audit trail.
Break Tracking
Track paid and unpaid breaks. Configurable break rules per role or location.
Drag & Drop Builder
Build your weekly schedule visually. Drag shifts, resize them, copy from last week — it's fast.
Instant Publishing
Hit publish and staff see their schedule immediately on any device. No printing, no texting.
Role-Based Views
Filter the schedule by role, position, or individual. See exactly who's working when.
Shift Templates
Save common shift patterns as templates. Apply them with one click to speed up scheduling.
Availability Management
Staff submit their availability. You see it when building the schedule — no more conflicts.
Shift Swap Requests
Staff can request shift swaps. You approve or deny from the dashboard.
Off-Site Encrypted Storage
All data is stored on Supabase's enterprise PostgreSQL infrastructure — not on our servers. Data is encrypted at rest and in transit over HTTPS.
Hashed Credentials
Passwords and admin credentials are never stored in plain text. All sensitive credentials are hashed using SHA-256 before being saved to the database.
Tenant Data Isolation
Every client's data is scoped by a unique tenant ID with row-level security enforced at the database level. No cross-tenant data access is possible.
Zero Credentials in Code
No passwords, API keys, or secrets are stored in source code. All credentials are managed through environment variables and secure config stores.
Role-Based Access Control
Every user has a defined role — admin, manager, or staff. Access to data and features is enforced at both the application and database level.
Audit Logging
Admin actions are logged with timestamps and user attribution. Full audit trail available for compliance and accountability.
| Feature |
Starter |
Pro |
Enterprise |
| Timeclock | ✓ | ✓ | ✓ |
| QR Clock-In | ✓ | ✓ | ✓ |
| Scheduling | ✓ | ✓ | ✓ |
| Task Assignment | ✓ | ✓ | ✓ |
| Team Chat | ✓ | ✓ | ✓ |
| GPS Geofencing | — | ✓ | ✓ |
| Training Center | — | ✓ | ✓ |
| Recipe Vault | — | ✓ | ✓ |
| Document Vault | — | ✓ | ✓ |
| Labor Reports + PDF | — | ✓ | ✓ |
| Custom Branding | — | ✓ | ✓ |
| Multi-Location | — | — | ✓ |
| API Access | — | — | ✓ |
| White-Label | — | — | ✓ |
| Priority Support | — | — | ✓ |
| Staff Limit | Up to 5 | Unlimited | Unlimited |
| Data Retention | 14 days | 90 days | Unlimited |