Myko Security Policy

Myko Security Policy

Introduction and Commitment to Security

Introduction and Commitment to Security

At Myko AI, safeguarding our clients' data is foundational to what we do. We commit to employing industry-standard security measures and adopting innovative practices to ensure the highest levels of data privacy and security.

At Myko AI, safeguarding our clients' data is foundational to what we do. We commit to employing industry-standard security measures and adopting innovative practices to ensure the highest levels of data privacy and security.

Compliance

Compliance

SOC 2 Type II Compliance: Myko AI adheres to the stringent requirements of SOC 2 Type II certification. Myko also regularly undergoes penetration tests to validate our security, availability, and confidentiality controls.

SOC 2 Type II Compliance: Myko AI adheres to the stringent requirements of SOC 2 Type II certification. Myko also regularly undergoes penetration tests to validate our security, availability, and confidentiality controls.

Enterprise-Grade Security

Enterprise-Grade Security

Myko AI adapts to the way your team uses Salesforce.
We align with your fields, record types, and business rules without long setup or rigid templates.

Myko AI adapts to the way your team uses Salesforce.
We align with your fields, record types, and business rules without long setup or rigid templates.

No Data Used For Training

Myko is not building its own LLM, and does not use any customer data to build or train any AI Models. We prioritize the utmost privacy and security by ensuring Client Data Isolation.

Data Isolation

Each client's data is securely compartmentalized, safeguarding against access from other clients or the public.

Encryption In Transit

TLS 1.2+ encryption for all API and network communications, ensuring your data is protected during transmission.

Encryption At Rest

AES-256 encryption for all databases and file storage, providing military-grade protection for stored data.

Authentication & Access Control

Each user authenticates using their CRM access credentials, ensuring a one-to-one match in permission structure and data accessibility.

Comprehensive Audit Trails

All user and administrative actions are logged and available for review, providing complete transparency.

System Architecture and Security Measures

Myko AI's infrastructure utilizes AWS, a platform known for its robust security standards. This strategic choice enables us to leverage AWS's comprehensive security features, ensuring the protection of customer data and the prevention of unauthorized access. In managing data, Myko AI adopts a minimal retention strategy. While data is essential for our operations, we only store what is necessary for service delivery. Metadata, crucial for identifying the correct data sources and optimizing our AI's performance, is retained securely, encompassing details like table names, column names, and user-generated key definitions.

Mirrored Business Logic

Myko mirrors the underlying business logic and rules of your software, so users will only be able to carry out actions that they would be able to perform if using the software like Salesforce directly. This ensures complete consistency with your existing security policies.

Data Deletion Requests

Clients can request the deletion of their data in accordance with our comprehensive data management policies. Requests are processed promptly, following a verified authentication procedure to ensure the integrity and security of the data deletion process.