Myko Security Policy

Introduction and Commitment to Security
At Myko AI, safeguarding our clients' data is foundational to what we do. We commit to employing industry-standard security measures and adopting innovative practices to ensure the highest levels of data privacy and security.

Privacy policy

Terms of service

Compliance
SOC 2 Type II Compliance: Myko AI adheres to the stringent requirements of SOC 2 Type II certification. Myko also regularly undergoes penetration tests to validate our security, availability, and confidentiality controls.

AICPA CERTIFIED

Enhanced Data Security Measures

No Data Used For Training
: Myko is not building it's own LLM, and does not use any customer data to build or train any AI Models. We prioritize the utmost privacy and security by ensuring Client Data Isolation: Each client's data is securely compartmentalized, safeguarding against access from other clients or the public. Secure AI Integration:

Robust Data Encryption: All data managed by Myko AI is encrypted and securely hosted on a SOC 2 Type II certified AWS cloud instance, embodying our commitment to data security and integrity.

System Architecture and Security Measures
Myko AI's infrastructure utilizes AWS, a platform known for its robust security standards. This strategic choice enables us to leverage AWS comprehensive security features, ensuring the protection of customer data and the prevention of unauthorized access. Importantly, we maintain a strict policy that customer data never enters third-party generative AI models, preserving the integrity and confidentiality of your information.In managing data, Myko AI adopts a minimal retention strategy. While data is essential for our operations, we only store what is necessary for the service delivery. Metadata, crucial for identifying the correct data sources and optimizing our AI's performance, is retained securely, encompassing details like table names, column names, and user-generated key definitions.

Authentication and Access Control
Myko is able to mirror access controls put in place by existing data infrastructure that users connect to. Each individual user has the same level of granular permissions by default that they have in the underlying software that Myko is connecting to. Myko also mirror's the underlying business logic and rules of your underyling software, so if you have a validation rule in place, Myko will not be able to override it.

Data Deletion Requests
Clients can request the deletion of their data in accordance with our comprehensive data management policies. Requests are processed promptly, following a verified authentication procedure to ensure the integrity and security of the data deletion process.

Contact Information for Security Concerns
For any security concerns or inquiries, clients are encouraged to contact our dedicated security team at security@myko.ai. Our commitment to responsiveness and transparency underscores our dedication to your data’s security.

Get started

Let’s have a conversation

Stay up to speed on the latest Myko news.

Thanks for subscribing to the Myko AI. Stay tuned for our latest articles.
Oops! Something went wrong while submitting the form.

Investors and press