We take the security of your data seriously. Here is an overview of our security practices and how we protect your information.
Loka is built on modern, secure cloud infrastructure. All our services run in trusted enterprise cloud environments, leveraging their built-in security, compliance, and disaster recovery capabilities.
All data sent to or from Loka is encrypted in transit using industry-standard TLS. Additionally, your data, including meeting recordings, transcripts, summaries, and account information, is encrypted at rest.
Access to user data is strictly controlled. We use secure authentication methods, including single sign-on (SSO) with supported providers like Google. Internal access to production environments is restricted to authorized personnel who need access to perform their duties.
We partner with trusted third parties for services like payment processing, email delivery, and AI modeling. These partners are carefully vetted to ensure they meet our rigorous security and privacy standards.
We continuously monitor our systems for potential vulnerabilities and unauthorized access. We employ logging and alerting mechanisms to detect and respond to suspicious activities promptly.
If you believe you have found a security vulnerability in Loka, please let us know right away. We take all reports seriously and will investigate and address verified issues as quickly as possible.
For security-related questions or to report a vulnerability, contact support@lokanote.com.