Back to Home
Security & Privacy

Your Data. Your Control. Always.

Juxano is built with privacy-first architecture and enterprise-grade security. Your meeting data is never used to train AI models, and you maintain complete ownership and control.

Core Security Principles

Privacy-First Architecture

Built from the ground up with privacy as a core design principle. Choose between Premium or Privacy tier based on your data handling requirements.

End-to-End Encryption

Privacy tier includes end-to-end encryption where technically feasible. Your data is encrypted in transit and at rest with industry-standard protocols.

Zero AI Training on Your Data

Your conversations are never used to train or fine-tune generative AI models. This is guaranteed across all subscription tiers, no exceptions.

Data Ownership & Control

You retain full ownership of your data. Choose your data retention policy, export your transcripts anytime, and delete your data permanently.

100% Undetectable Operation

No meeting bots, no visible presence. Juxano operates entirely on your device with system-level audio capture—completely invisible to other participants.

Infrastructure Security

JWT authentication, Redis-backed session management, security token gating, and cloud-deployable architecture (AWS/Azure) with dedicated infrastructure options.

Data Handling by Subscription Tier

Choose the privacy level that matches your requirements. Both tiers guarantee no AI training on your conversations.

Premium

$12/month

  • Full transcription and AI features
  • Anonymized data may improve speech recognition accuracy
  • User data never used for generative AI training
  • Standard data retention with user control
  • Secure cloud storage with encryption at rest
Maximum Privacy

Privacy

$100/month

  • Maximum privacy and data isolation
  • End-to-end encryption where technically feasible
  • Zero data used for training or analytics
  • No anonymized data collection
  • Complete exclusion from model improvement pipelines
  • User-controlled data lifetime policies

Technical Security Implementation

Authentication & Access Control

  • JWT-based authentication with secure token rotation
  • Environment-based security token gating
  • Session management with stateful routing
  • Optional SSO integration for enterprise

Data Protection

  • Encryption in transit (TLS 1.3)
  • Encryption at rest for stored data
  • Secure session management
  • User-controlled data retention and deletion

Infrastructure Security

  • Load-balanced architecture with security controls
  • WebSocket session isolation and pinning
  • Cloud-deployable with security best practices
  • Regular security audits and updates

Privacy Guarantees

  • No generative AI training on user conversations
  • No data sold or shared beyond essential providers
  • Optional full privacy tier with zero retention
  • Transparent data handling policies

Certifications & Compliance Status

Security Best Practices

Industry-standard security controls implemented across infrastructure

Implemented

Data Privacy Controls

Privacy-first architecture with user-controlled data handling

Implemented

SOC 2 Type II

Security, availability, and confidentiality compliance audit

In Progress

ISO 27001

Information security management system certification

Planned

GDPR Compliance

Full compliance with EU data protection regulations

In Progress

Guaranteed Across All Plans

Full Data Ownership

You own and control all your meeting data

No AI Training

Never used to train generative AI models

No Data Sales

Data not sold or shared beyond essential infrastructure

Questions About Security?

Our security team is here to answer your questions about data handling, compliance, and enterprise security requirements.