Security and privacy

Focused workspace, clear data boundaries.

Harken keeps product claims grounded in the current implementation. Stronger compliance claims should only be added when the system actually supports them.

Data boundaries

Data typeUsed forScope
AudioTranscription and meeting captureAuthenticated request/session
TranscriptCleanup, summaries, and recent historySigned-in user
Images and screenshotsVisual explanation, OCR-style reading, and capture history where enabledSigned-in user or local capture flow
LexiconLearned correctionsSigned-in user
Meeting notesNotes, action items, and question answeringPro user profile
Trace/debugReliability diagnosisRedacted event shapes, counts, timings, and keyed hashes
BillingPlan and entitlement stateAccount, via Lemon Squeezy when live

No unsupported claims.

Harken should be described as a focused capture and structuring workspace, not as certified compliance infrastructure unless that certification is implemented and verified.