3 seats free

Trust

Your documents stay yours.
Your team's data stays out of training sets.

HeyLoopy runs on SOC 2 Type II-certified AWS infrastructure, following SOC 2-aligned controls. AES-256 encryption at rest. TLS for all customer-facing traffic. No customer content is ever used to train external models.

§ 01 Posture
Compliance

SOC 2-aligned controls on certified AWS

Built on SOC 2 Type II-certified AWS infrastructure, following SOC 2-aligned controls. HeyLoopy itself is not currently SOC 2 certified. Enterprise customers can request the current control narrative under NDA.

Encryption

AES-256 at rest, TLS in transit

All customer data is encrypted at rest with AES-256. The primary database uses SSE-KMS with a dedicated customer-managed AWS KMS key; backups inherit the same key. Object storage uses AWS-managed SSE-S3, applied to every object. All customer-facing traffic is delivered over TLS via auto-renewing ACM certificates.

Privacy

Your content is not a training set

Your documents, prompts, learner responses, and analytics are never used to train external foundation models. They are used to power your team's coach and nothing else.

Scope of content

SOPs and procedures, not PHI

HeyLoopy processes the documents your team needs to remember: SOPs, policies, procedures, guidelines, training materials. It is not designed for, and should not be used to store, protected health information, financial customer records, or other sensitive personal data of your end-customers. Because procedural training content is not PHI, no Business Associate Agreement is required: clinical teams drill the bundle and the protocol while patient data stays in the EHR.

Vendor security review

VSQ on request

For procurement or security teams that need to vet us, we complete vendor security questionnaires (SIG Lite, CAIQ, custom) on request. We typically turn one around in 5 business days. Email support@heyloopy.com with your form.

GDPR + data residency

DPA available, US region

A Data Processing Agreement with Standard Contractual Clauses is available for customers subject to GDPR. Customer data is stored in AWS us-east-1 (United States); EU/UK transfers are covered by the SCCs in our DPA.

Operational

Subprocessors and incident response

A current list of named subprocessors is published in our privacy policy. Material security incidents are disclosed to affected customers without undue delay, and where feasible within 72 hours of detection.

Payment scope

PCI out of scope by design

HeyLoopy does not store, transmit, or process payment card numbers. Payment processing is delegated to Stripe (PCI DSS Level 1 service provider). This applies across all plans, including Enterprise.

§ 02 Subprocessors

The third parties in the data path.

Every vendor that touches customer data, what it does, and the region it runs in. This list is also published in our privacy policy.

HeyLoopy subprocessor table: vendor, purpose, and region for each third party in the data path.
§ 03 Talk to a human

Need the control narrative, a VSQ completed, or a custom review?

Send us your form or the questions you need answered. We'll send the appropriate document under NDA and turn around a completed VSQ in about 5 business days.

Newsletter

One short note a month.

How HeyLoopy is being used in the wild, what the science says, no marketing fluff.

No spam. Unsubscribe any time. See our privacy policy.

§ Try free

Training that survives month six.

Daily 60-second drills, built from the documents you already have. Free for teams up to three.

3 seats free · no card · first drill in five minutes