Skip to main content

Compliance

MeetLoyd provides enterprise-grade compliance features to help you meet regulatory requirements and maintain strong governance over your AI operations.

Enterprise: Compliance Cockpit

Enterprise customers have access to the Compliance Cockpit -- a dedicated command center with real-time compliance scoring, evidence vault with cryptographic verification, AI risk registry, external auditor portal, scheduled report generation, and policy lifecycle management. Access it from the Compliance button in the top navigation bar.

Supported Frameworks

MeetLoyd supports 9 major regulatory compliance frameworks with real-time control monitoring and automated evidence collection.

SOC 2 Type II

19 Trust Services Criteria controls:

CategoryControlsExamples
Security (CC)12SSO, MFA, access reviews, encryption, incident response
Availability (A)2System monitoring, recovery planning
Processing Integrity (PI)1Data integrity controls
Confidentiality (C)1Data retention policies
Risk & Change (CC3, CC8)3Risk assessment, change management

GDPR

19 controls covering all key articles:

CategoryArticlesControls
PrinciplesArt. 5Purpose limitation, storage limitation
LawfulnessArt. 6, 7Legal basis, consent management
Data Subject RightsArt. 15-22Access, erasure, portability, rectification, automated decision-making
TransparencyArt. 12, 13Privacy notices, information disclosure
SecurityArt. 25, 32Privacy by design, security measures
AccountabilityArt. 30, 33, 35Processing records, breach notification, DPIA

AI-Specific: Article 22 controls for automated decision-making safeguards and human intervention rights.

HIPAA

18 controls across all safeguard types:

SafeguardSectionsControls
Administrative164.308Security management, workforce security, incident procedures
Physical164.310Facility controls, device/media controls
Technical164.312Access control, audit controls, transmission security

EU AI Act (Enterprise)

12 controls covering high-risk AI system requirements:

CategoryArticlesControls
ClassificationArt. 6, 8High-risk AI classification, compliance requirements
Risk & QualityArt. 9, 17Risk management, quality management system
Data & DocsArt. 10, 11, 12Data governance, documentation, record-keeping
TransparencyArt. 13, 50User information, AI content marking
OversightArt. 14, 26Human oversight, deployer obligations
SecurityArt. 15Accuracy, robustness, cybersecurity

ISO 42001 (Enterprise)

AI Management System standard with 9 controls covering organizational context, leadership commitment, AI risk assessment, AI impact assessment, AI competence, system design, human oversight, monitoring, and continual improvement.

ISO 27001

Information security management with 7 control domains: Security policies (A.5), Security organization (A.6), Access control (A.9), Cryptography (A.10), Operations security (A.12), Incident management (A.16), and Compliance (A.18).

Additional Enterprise Frameworks

FrameworkFocus
SOXFinancial controls, audit trails, access controls
DORAEU financial ICT resilience
NIS2EU cybersecurity for critical infrastructure
PCI-DSSPayment card security, data protection
AMF/CIFFrench wealth management regulatory compliance

Data Handling

Encryption

Data StateEncryption
At RestAES-256
In TransitTLS 1.3
BackupsAES-256
API KeysHashed (bcrypt)

Data Residency

RegionLocation
USAWS us-east-1 (N. Virginia)
EUAWS eu-west-1 (Ireland)
APACAWS ap-southeast-1 (Singapore)

Enterprise customers can request additional regions.

Data Isolation

Multi-tenant architecture with strict isolation: tenant-level database isolation, separate encryption keys per tenant, network-level segmentation, and no cross-tenant data access.

Retention

Data Retention Policies

Data TypeDefault RetentionConfigurable
Conversation Messages90 daysYes
Agent MemoryIndefiniteYes
Audit Logs1 yearYes (min 90 days)
Task Runs30 daysYes
Analytics2 yearsYes

Access Controls

Role-Based Access Control (RBAC)

RolePermissions
ViewerRead agents, view conversations
MemberCreate/edit agents, run tasks
AI EngineerTechnical focus: agents, tools, workflows
AdminManage users, settings
OwnerFull access, transfer ownership

Compliance Reports

Generate compliance reports for SOC 2, GDPR, HIPAA, or combined frameworks. Reports include overall compliance score per regulation, per-module status breakdown, violation history, and configuration audit trail. Available in PDF, CSV, and Excel formats.

Scheduled Reports

Automate compliance reporting on a schedule (weekly, monthly, quarterly, or annually) with email delivery to compliance and security teams.

Certifications & Reports

DocumentAvailability
SOC 2 Type II ReportOn request (NDA)
Penetration Test SummaryOn request
Privacy PolicyPublic
Terms of ServicePublic
DPAOn request
BAA (HIPAA)Enterprise only

Contact compliance@meetloyd.com or request documents from Settings > Security > Compliance Documents.

Best Practices
  1. Enable MFA -- Require MFA for all users, especially admins
  2. Use SSO -- Integrate with your identity provider for centralized access control
  3. Configure retention -- Set appropriate retention policies for your compliance needs
  4. Monitor audit logs -- Regularly review for suspicious activity
  5. Limit permissions -- Follow the principle of least privilege
  6. Regular access reviews -- Periodically review who has access to what

Next: Learn about Audit Logs for detailed activity tracking.