Enterprise-grade trust & transparency
Everything your security team needs to vet Loopion — architecture, compliance, AI practices, and subprocessor transparency — in one place.
AES-256
Encryption at rest
TLS 1.3
Encryption in transit
EU
Data residency
Zero
Customer data used for training
Four pillars of trust
Loopion's trust framework covers security, privacy, AI ethics, and vendor transparency.
Security Architecture
End-to-end encryption, SOC 2 practices, Azure infrastructure, and zero-trust design.
- TLS 1.3 in transit, AES-256 at rest
- Azure-hosted capture workers
- Supabase Postgres with RLS
- Zero training on customer data
- Automatic audio deletion post-processing
- Environment isolation (staging/production)
Privacy & GDPR
Full GDPR compliance with data subject rights, lawful basis documentation, and EU hosting.
- EU data residency (eu-north-1)
- Data subject access & deletion requests
- Lawful basis: legitimate interest + consent
- Data minimisation by design
- 72-hour breach notification
- Data Protection Impact Assessment
Responsible AI
Transparent AI usage with human oversight, no model training on customer data, and audit trails.
- No customer data used for model training
- Human-reviewable AI outputs
- Multi-provider architecture (OpenAI, Anthropic)
- Configurable AI settings per workspace
- Prompt transparency & audit logging
- Bias monitoring in action extraction
Subprocessors
Full transparency on every third-party that touches your data, with advance notice of changes.
- 7 vetted subprocessors
- 30-day advance notice of changes
- DPA in place with all processors
- Regular security assessment reviews
- Contractual data protection obligations
- Right to object to new subprocessors
Legal & compliance documents
Privacy Policy
How we collect, process, and protect your data
Terms of Service
Service terms and conditions
Cookie Policy
Cookie usage and management
Recording Consent
Meeting recording obligations
GDPR Compliance
EU data protection compliance
Responsible AI
AI principles and safeguards
Subprocessors
Third-party data processors
Data Processing Agreement
Enterprise DPA
Need a security review?
We're happy to complete your security questionnaire, provide our SOC 2 report, or schedule a call with our security team.