Lovex

Trust & Security

Preview

The single page our security, privacy, and compliance posture is summarized on.

Last reviewed 2026-05-17. Questions: security@lovex.dev.

This trust center is in active development. Read it as our target security posture, not a finished certification report.

Some commitments described below are operationally in effect today — GDPR posture, the published DPA at /dpa, EU-primary data residency, TLS in transit, AES-256 at rest, 72-hour breach notification, sub-processor transparency, public status page at /status, vulnerability disclosure policy at /security/disclosure, sub-processor change RSS at /subprocessors/feed.xml, security.txt at /.well-known/security.txt. Other items describe target state we are working toward and have not yet completed — SOC 2 readiness, SSO/SAML, automated uptime probing (the status page is operator-curated today), IP allowlisting, third-party penetration testing, formal data classification policy, customer-managed keys. Where an item is roadmap-only, we mark it explicitly. Lovex is a small Swedish company with the Lova product in the Preview stage; this page reflects that reality. If you need a contractual commitment to a specific control beyond what is in effect today, write to security@lovex.dev or legal@lovex.dev and we will respond in writing.

Lovex AB is a swedish aktiebolag under eu and swedish law. subject to gdpr, the eu ai act, and the swedish companies act. Our products are built EU-first, with compliance treated as product architecture rather than bolt-on paperwork. This page lays out what that means in practice, and what we have not yet done. Anything we do not yet have, we say so plainly here.

Certifications and frameworks

We do not claim certifications we do not hold. Audited certifications follow real enterprise demand; until then, we publish our underlying controls openly and welcome written security reviews.

Regulatory posture

Where customer data lives

Application data sits in the EU. Sub-processors that operate in the United States are covered by the EU-U.S. Data Privacy Framework plus Standard Contractual Clauses with supplementary measures per Schrems II.

Technical and organizational measures

These are the same measures listed in Annex B of our Data Processing Agreement, expanded.

AI use

AI features are powered by third-party large language model providers under written DPAs. Providers are listed by category at /subprocessors. Customer content sent to AI features is processed in transit, not retained for model training, and is deleted from provider-side abuse-monitoring logs on the provider's published schedule.

Training policy. We do not use customer content to train our own models. Our AI providers are contractually prohibited from using customer content to train their general-purpose models, where they offer that commitment.

Human oversight. Outputs are presented as drafts that the user accepts, edits, or rejects. Users can escalate to a human reviewer in every flow.

Retention, export, and deletion

Active account content is retained while the customer is active. Decaying telemetry (activity feed, notifications, project chat) is pruned on a daily cron with category-specific TTLs. Account deletion is processed immediately on request — there is no user-facing recovery window. Backups containing personal data are overwritten by the backup rotation, typically within 30 days, after which the data is no longer accessible. Accounting records are retained for seven years as required by Swedish bookkeeping law (this is a legal floor that overrides GDPR deletion for those records specifically).

Sub-processors

We use a small set of sub-processors categorized by role (hosting, database, AI inference, email, analytics, payments, identity, error monitoring). Each is bound by a written DPA and an appropriate transfer safeguard. We give at least 30days’ notice before adding or replacing a sub-processor by updating the public list at /subprocessors. Customers with a signed order form can ask for the specific vendor identities at security@lovex.dev under a confidentiality undertaking.

Incident response

Customer-impacting incidents are triaged through a documented runbook: detect, contain, assess, notify, remediate, post-mortem. Personal data breaches affecting customers trigger notification within 72 hours of becoming aware, per Article 33 GDPR. Severity-high incidents land in a written post-mortem within 14 days.

Notification SLA. Within 72hours of becoming aware of a Personal Data Breach affecting a customer’s data, we notify the customer per Article 33 GDPR.

Vulnerability disclosure. Send findings to security@lovex.dev. Full policy with response SLAs, severity matrix, scope, and safe-harbor terms at /security/disclosure. Machine-readable contact at /.well-known/security.txt (RFC 9116).

Contracts and documents

Security reviews and questionnaires

We maintain a pre-answered questionnaire at /trust/security-questionnaire covering the ~50 most common procurement questions (CAIQ, SIG-Lite, custom). Most procurement teams either accept it in lieu of filling their own questionnaire or copy-paste from it. For custom questions or anything not covered, email security@lovex.dev with the questionnaire attached and the deal context; standard turnaround is five business days, faster for deals in active negotiation.

Custom DPAs, master services agreements, and signed counterparts of our published documents: legal@lovex.dev.

Contacts

Roadmap

Where we are headed, with realistic timing rather than ship dates we cannot guarantee:

Change history

We update this page when the underlying posture changes. The current version was last reviewed on 2026-05-17. Material changes are announced 30 days in advance for sub-processor additions and on publication for other changes.