Security & Privacy
Meeting data is among the most sensitive information in any organization. Karnyx is built from the ground up with security and privacy as core architectural principles.
Security Overview
SOC 2 Type II
Building toward SOC 2 Type II certification. Our security controls align with the five trust service criteria. Current status: in progress.
GDPR & CCPA
Fully compliant with EU GDPR and California CCPA privacy regulations.
Encryption at Rest
All meeting data encrypted with AES-256-GCM before being written to disk.
TLS 1.3
All data in transit encrypted with TLS 1.3 using strong cipher suites.
Encryption
Data at Rest
All sensitive data is encrypted before being written to storage:
- Audio files: AES-256-GCM with unique keys per file
- Transcripts: Encrypted at the database column level
- Summaries and action items: Encrypted at rest in PostgreSQL
- Participant data: PII fields encrypted with envelope encryption
Data in Transit
All network communication uses TLS 1.3:
- Mac app to backend API: HTTPS with certificate pinning
- Backend to third-party services (Deepgram, Anthropic): TLS 1.3
- Database connections: Encrypted with TLS and mutual authentication
- Redis connections: TLS with authentication required
Key Management
Access Control
Role-Based Access Control (RBAC)
Karnyx implements fine-grained RBAC at the organization and workspace level:
| Role | Permissions |
|---|---|
| OWNER | Full administrative control including billing and member management |
| ADMIN | Manage workspace settings, members, and all meetings |
| MEMBER | Create and edit own meetings, view workspace meetings |
| VIEWER | Read-only access to workspace meetings and participants |
Single Sign-On (SSO)
Enterprise plan includes SSO via SAML 2.0 and OIDC:
- Okta, Google Workspace, Microsoft Entra ID (Azure AD)
- Just-in-time (JIT) user provisioning
- SCIM 2.0 for automated user lifecycle management
- Enforce SSO for all organization members
Compliance & Certifications
SOC 2 Type II
We are building toward SOC 2 Type II certification. Our security controls align with the five trust service criteria. Current status: in progress. Security documentation is available to Enterprise customers under NDA.
GDPR Compliance
We comply with the EU General Data Protection Regulation (GDPR):
- Data Processing Agreements (DPA) available for all customers
- Right to access, rectify, delete, and export personal data
- Data residency options (US, EU) for Enterprise customers
- Data breach notification within 72 hours
CCPA Compliance
California Consumer Privacy Act (CCPA) rights supported: access, deletion, and opt-out of data sales (we never sell user data).
HIPAA (Coming Soon)
HIPAA compliance for healthcare customers is in development. Contact sales for timeline.
Data Retention & Deletion
You control how long your data is retained. Configure retention policies per workspace or organization-wide.
Retention Options
- 30 days: Automatically delete recordings and transcripts after 30 days
- 90 days: Standard retention period for most teams
- 1 year: Longer retention for compliance or archival purposes
- Forever: Retain indefinitely (default)
Manual Deletion
Delete individual meetings or bulk delete:
- Select meetings to delete from the dashboard
- Click Delete and confirm
- Data is moved to a soft-delete state for 7 days (recoverable)
- After 7 days, data is permanently deleted and unrecoverable
Permanent Deletion
Consent Management
Karnyx provides tools to help you manage recording consent in compliance with local laws.
Consent Banner
For Bot Mode meetings, the bot announces itself and the meeting platform displays a recording notification.
Consent Tracking
Enterprise plan includes:
- Automatic logging of who attended recorded meetings
- Participant consent tracking (opt-in/opt-out)
- Audit trail of consent decisions
Legal Responsibility
Audit Logs
Enterprise plan includes comprehensive audit logging for security and compliance:
Events Logged
- User logins, logouts, and authentication failures
- Meeting creation, updates, and deletions
- Member additions and removals from workspaces
- Permission changes and role assignments
- Data exports and API key creation
- Settings changes (workspace, organization)
Log Retention
Audit logs are retained for 1 year and can be exported in JSON or CSV format.
Security Contact
If you discover a security vulnerability, please report it responsibly:
Email: security@karnyx.ai
PGP Key: Download Public Key
We commit to acknowledging reports within 24 hours and providing a resolution timeline within 72 hours.