Security

Security at Loka

We take the security of your data seriously. Here is an overview of our security practices and how we protect your information.

Infrastructure and Hosting

Loka is built on modern, secure cloud infrastructure. All our services run in trusted enterprise cloud environments, leveraging their built-in security, compliance, and disaster recovery capabilities.

Data Encryption

All data sent to or from Loka is encrypted in transit using industry-standard TLS. Additionally, your data, including meeting recordings, transcripts, summaries, and account information, is encrypted at rest.

Access Control

Access to user data is strictly controlled. We use secure authentication methods, including single sign-on (SSO) with supported providers like Google. Internal access to production environments is restricted to authorized personnel who need access to perform their duties.

Third-Party Processors

We partner with trusted third parties for services like payment processing, email delivery, and AI modeling. These partners are carefully vetted to ensure they meet our rigorous security and privacy standards.

Continuous Monitoring

We continuously monitor our systems for potential vulnerabilities and unauthorized access. We employ logging and alerting mechanisms to detect and respond to suspicious activities promptly.

Reporting Vulnerabilities

If you believe you have found a security vulnerability in Loka, please let us know right away. We take all reports seriously and will investigate and address verified issues as quickly as possible.

Contact Security

For security-related questions or to report a vulnerability, contact support@lokanote.com.

Loka Note | Security