Privacy & Security

V 1.1 – Last edited on Jul 8, 2023

Privacy & Security

Seekit.io is powered by GPT-4 API. Just like a note taker, Seekit is most effective when granted access to your meetings and sales enablement management tools. However, we understand that these platforms house some of your most sensitive and confidential information. That’s why our top priority is ensuring your data remains protected, never making its way into Large Language Models (LLMs) or into the hands of bad actors.

Seekit is a fast-growing early stage startup. As we grow, we are committed to full transparency regarding the usage of your information as we evolve. We actively collaborate with beta users to determine the controls you desire for the storage, management, and leveraging of your data. And we actively keep all users informed of Security updates as we grow.

Use Of AI & GPT-4

Your information will not contribute to the training of Large Language Models (LLMs). When using the GPT-4 API, it is important to know that the information you provide as input does not contribute to the training of Large Language Models (LLMs). OpenAI, the organization behind GPT-4, has implemented strict data handling policies to ensure that user data remains private and secure.


While GPT-4 is trained on vast amounts of data from various sources, the GPT-4 API operates separately from the training process. OpenAI retains API data for a limited period, primarily for operational purposes such as maintaining service quality, addressing bugs, or improving the system’s overall performance. During this retention period, user data is not used to retrain or update the LLM.


By keeping the API and training data separate, OpenAI aims to maintain user privacy and prevent sensitive or confidential information from inadvertently becoming part of the model’s knowledge base. This commitment to data privacy and security ensures that you can use the GPT-4 API with confidence, knowing that your information will not be integrated into the LLM.

Data Storage

Your information is stored securely in Digital Ocean. Seekit stores information from your meetings in Digital Ocean, a highly secure and reliable cloud storage service. Digital Ocean is a reliable cloud storage service designed to store and retrieve data at scale. Security is a top priority for Digital Ocean, and they have implemented various measures to ensure the protection of the data stored in Digital Ocean. Some key security features include:

  1. Data encryption: Digital Ocean provides server-side encryption (SSE) and client-side encryption options. With SSE, data is encrypted before it is stored, and decrypted when it is retrieved. Client-side encryption allows you to encrypt data on your end before uploading it to Digital Ocean.

  2. Access control: Digital Ocean supports multiple access control mechanisms, including bucket policies, access control lists (ACLs), and Identity and Access Management (IAM) policies, allowing you to manage permissions for users and groups with fine-grained control.

  3. Versioning: Digital Ocean supports versioning, which preserves, retrieves, and restores every version of every object in a bucket, providing an extra layer of protection against accidental deletion or overwriting.

  4. Secure data transfer: Data transfers to and from Digital Ocean are secured using HTTPS and SSL/TLS encryption, ensuring secure transmission of data over the network.

  5. Compliance: AWS S3 is compliant with a wide range of security standards and certifications, such as GDPR, HIPAA, and SOC 1, 2, and 3, ensuring that data is stored and managed according to industry best practices and regulations.

  6. Monitoring and logging: AWS S3 provides tools like Amazon S3 access logs, AWS CloudTrail, and Amazon Macie to monitor and audit access to your stored data, allowing you to detect and respond to potential security threats.

Data Encryption

All recorded Zoom calls and associated data will be encrypted both in transit and at rest. Encryption will be implemented using industry-standard protocols and algorithms to ensure the confidentiality and integrity of user data.

Access Control

Access to the recorded Zoom calls and user data will be restricted to authorized personnel only. The Company will implement appropriate access controls, including strong authentication mechanisms and role-based access privileges, to prevent unauthorized access or disclosure.

Data Retention

The App will retain recorded Zoom calls and associated data for a period of [insert retention period]. After this period, the data will be securely deleted from the App’s servers and backups to ensure compliance with applicable data protection laws and regulations.

Server Security

The App’s servers will be hosted in a secure environment with robust physical and logical controls. These controls will include firewalls, intrusion detection and prevention systems, regular security patches, and ongoing monitoring to protect against unauthorized access and potential vulnerabilities.

Compliance With Privacy Laws

The Company is committed to complying with all relevant privacy laws, regulations, and industry standards. The App will adhere to applicable data protection regulations, including but not limited to the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

User Rights And Responsibilities

Users have the right to request access to their recorded Zoom calls and associated data, as well as the right to request corrections or deletion of their personal information. The App will provide mechanisms for users to exercise these rights and will respond to such requests in a timely manner.

User Responsibilities

Users are responsible for using the App in accordance with its intended purpose and in compliance with all applicable laws and regulations. Users should not share sensitive or confidential information during Zoom calls unless necessary and should be aware of their obligations to obtain appropriate consent from participants.

Incident Response And Breach Notification

In the event of a data breach or security incident, the Company will promptly investigate the matter, take appropriate remedial actions, and notify affected users and regulatory authorities as required by law. The Company will maintain an incident response plan to ensure a swift and coordinated response to any security incidents.

Training And Awareness

The Company will provide regular training and awareness programs to employees and contractors involved in the development and maintenance of the App. These programs will promote understanding of security best practices, privacy obligations, and the importance of safeguarding user data.

Policy Review And Updates

This Security Policy will be reviewed periodically and updated as necessary to reflect changes in technology, regulatory requirements, or business practices. Users will be notified of any material changes to this policy.