Security

Last updated: February 2026

Security is foundational to Kill One Meeting. We protect your data with industry-standard practices and a privacy-first approach.

Infrastructure

Hosting

  • EU-based: All data is stored and processed within the European Union
  • SOC 2 & ISO 27001: Our infrastructure provider maintains industry-standard compliance certifications

Encryption

  • In transit: All data is encrypted using TLS
  • At rest: All stored data is encrypted
  • Secrets: API keys and tokens are stored in a dedicated secrets manager

Database

  • Backups: Automated daily backups
  • Access: Encrypted connections required
  • Credentials: Strong, randomly generated passwords

Authentication

Passwordless Authentication

Kill One Meeting uses magic link authentication. This means:

  • No passwords to steal: We don't store passwords, so there's nothing to leak in a breach
  • Email verification: Every login requires access to your email
  • Time-limited links: Magic links expire after 15 minutes
  • Single use: Each link can only be used once

Session Security

  • Secure tokens: Signed, httpOnly cookies for session management
  • Short-lived access: Sessions expire automatically
  • Token rotation: Refresh tokens are rotated on each use
  • Logout: Full session invalidation on logout

Integrations

Calendar Integration

  • OAuth 2.0: Industry-standard authorization
  • Read-only access: We request minimal permissions — only read access to calendar events
  • No content access: We don't access meeting descriptions, attachments, or recordings
  • Revocable: You can disconnect at any time from your settings

Messaging Integration

  • OAuth 2.0: Secure workspace authorization
  • Minimal scopes: Only permissions needed to send rating prompts and receive responses
  • No message access: We cannot read your channels, private messages, or files
  • Revocable: Disconnect anytime from your settings

Data Practices

What We Store

  • Meeting metadata (title, time, duration, attendees)
  • Rating scores (1-5) and optional comments
  • Experiment configurations and outcomes
  • Account information (email, team settings)

What We Never Store

  • Meeting content, descriptions, or agendas
  • Video or audio recordings
  • Attached documents or files
  • Slack messages or channel content
  • Passwords (we use passwordless auth)

Logging and Monitoring

  • No PII in logs: Personal identifiable information is never logged
  • Sanitized output: All logging goes through sanitization to prevent data leakage
  • No token logging: Authentication tokens, refresh tokens, and API keys are never logged

Development Practices

  • Security reviews: Code changes reviewed for security implications
  • Dependency monitoring: Regular updates to address vulnerabilities
  • Least privilege: Each component has only the permissions it needs
  • Input validation: All user input is validated and sanitized

Incident Response

In the event of a security incident, we will:

  • Investigate and contain the incident immediately
  • Notify affected customers within 48 hours (or as required by law)
  • Provide details about what data was affected
  • Take corrective action to prevent recurrence

Reporting Vulnerabilities

If you discover a security vulnerability, please report it responsibly:

  • Email: hello@killonemeeting.com with "Security" in the subject line
  • Include details about the vulnerability and steps to reproduce
  • Give us reasonable time to address the issue before public disclosure

We appreciate security researchers who help us keep our users safe.

Questions

For security-related questions, contact us at: hello@killonemeeting.com