Your Data Remains Your Data
Rest assured, we do not use your data to train AI summary models.
We emphasize that your meeting records and related data will never be used for AI summary model training. This means your data will always remain private and secure, never being utilized or analyzed by third parties. We implement strict data protection measures to ensure your data won't be leaked or misused.
For more detailed information, you can refer to the following Microsoft information links:
Meeting Data, Completely Secure
Meeting Ink is committed to providing secure, reliable meeting recording and analysis services. We have passed multiple internationally recognized security tests, demonstrating our system's strong protection capabilities. Choose Meeting Ink as your trusted meeting assistant, and together we'll create an efficient and secure meeting experience.
Meeting Ink Security Standards
We are committed not only to providing exceptional meeting recording and analysis services but also to ensuring the security of your data. We are proud to announce that Meeting Ink has successfully passed multiple internationally recognized security tests! These tests include penetration testing, vulnerability scans, OWASP 3.2 guideline audits, and source code reviews.
Passed Penetration Test
We conduct regular penetration testing to simulate real-world attack scenarios and validate our system's defense capabilities. These tests, carried out by experienced security experts, cover areas such as networks, applications, and social engineering attacks. By passing these rigorous tests, we demonstrate that our system can effectively defend against external threats, ensuring the safety of your data.
Passed Vulnerability Scan
We use advanced vulnerability scanning tools to continuously perform security checks on Meeting Ink's systems. Our security team regularly analyzes the scan results and promptly addresses any discovered vulnerabilities. Through these checks, we ensure that every component in our system is free of known security weaknesses, providing users with a safe and reliable service.
Compliant with OWASP 3.2 Standards
The development and operation of Meeting Ink adhere to the OWASP 3.2 standards, which cover the top ten security risks for web applications. Our system has passed the OWASP 3.2 standard audit, ensuring that we implement best practices to prevent SQL injection, cross-site scripting (XSS), and other common security threats.
Compliance with Government Configuration Baseline (GCB)
Meeting Ink adheres to the strict requirements of the Government Configuration Baseline (GCB), ensuring secure system configuration and management. Our system aligns with GCB best practices to maintain security and consistency. Passing GCB reviews demonstrates compliance with high standards for network, OS, and application security set by the government and industry.