Your Data. Your Control. Always.
Juxano is built with privacy-first architecture and enterprise-grade security. Your meeting data is never used to train AI models, and you maintain complete ownership and control.
Core Security Principles
Privacy-First Architecture
Built from the ground up with privacy as a core design principle. Choose between Premium or Privacy tier based on your data handling requirements.
End-to-End Encryption
Privacy tier includes end-to-end encryption where technically feasible. Your data is encrypted in transit and at rest with industry-standard protocols.
Zero AI Training on Your Data
Your conversations are never used to train or fine-tune generative AI models. This is guaranteed across all subscription tiers, no exceptions.
Data Ownership & Control
You retain full ownership of your data. Choose your data retention policy, export your transcripts anytime, and delete your data permanently.
100% Undetectable Operation
No meeting bots, no visible presence. Juxano operates entirely on your device with system-level audio capture—completely invisible to other participants.
Infrastructure Security
JWT authentication, Redis-backed session management, security token gating, and cloud-deployable architecture (AWS/Azure) with dedicated infrastructure options.
Data Handling by Subscription Tier
Choose the privacy level that matches your requirements. Both tiers guarantee no AI training on your conversations.
Premium
$12/month
- Full transcription and AI features
- Anonymized data may improve speech recognition accuracy
- User data never used for generative AI training
- Standard data retention with user control
- Secure cloud storage with encryption at rest
Privacy
$100/month
- Maximum privacy and data isolation
- End-to-end encryption where technically feasible
- Zero data used for training or analytics
- No anonymized data collection
- Complete exclusion from model improvement pipelines
- User-controlled data lifetime policies
Technical Security Implementation
Authentication & Access Control
- JWT-based authentication with secure token rotation
- Environment-based security token gating
- Session management with stateful routing
- Optional SSO integration for enterprise
Data Protection
- Encryption in transit (TLS 1.3)
- Encryption at rest for stored data
- Secure session management
- User-controlled data retention and deletion
Infrastructure Security
- Load-balanced architecture with security controls
- WebSocket session isolation and pinning
- Cloud-deployable with security best practices
- Regular security audits and updates
Privacy Guarantees
- No generative AI training on user conversations
- No data sold or shared beyond essential providers
- Optional full privacy tier with zero retention
- Transparent data handling policies
Certifications & Compliance Status
Security Best Practices
Industry-standard security controls implemented across infrastructure
Data Privacy Controls
Privacy-first architecture with user-controlled data handling
SOC 2 Type II
Security, availability, and confidentiality compliance audit
ISO 27001
Information security management system certification
GDPR Compliance
Full compliance with EU data protection regulations
Guaranteed Across All Plans
You own and control all your meeting data
Never used to train generative AI models
Data not sold or shared beyond essential infrastructure
Questions About Security?
Our security team is here to answer your questions about data handling, compliance, and enterprise security requirements.