TRUST & SECURITY

Protecting people, their dignity, and their health information — everywhere care happens.

Lokra is built for environments where safety, privacy, and reliability are essential. Our responsibility is simple: ensure people can carry their health information without exposing their identity, movements, or personal details — whether they’re navigating crisis or receiving
routine care.

We follow four core principles.

Privacy by Design

Lokra collects no personal identifiers — ever.

Our tools work without names, phone numbers, national IDs, or demographic data.

● No identity required
● No cloud copies
● No centralized database

People remain anonymous, and their health information stays under their control — essential for vulnerable populations, and reassuring for everyday users who want privacy-first health records.

Offline-First Operation

Care should never depend on connectivity.

Lokra supports care in camps, shelters, rural clinics, border crossings, and crisis zones  anywhere infrastructure is uncertain.

Clinicians can:

● Create new records offline
● Read a patient’s existing records offline

This ensures continuity of care, even when networks fail or don’t exist at all. (Note: Record updates are not currently supported — ensuring clarity and
accuracy.)

 

Interoperable & Standards-Aligned

A continuity layer that fits into diverse health systems.
Lokra uses globally recognized health data standards to ensure:
● Records are consistent across clinics and regions
● NGOs and distributed teams can work together smoothly
● Ministries and public health programs can integrate Lokra into existing workflows

Our tools complement — not replace — national systems and traditional EHRs.

Secure & Trustworthy by Default

Health information must be both private and reliable.

Lokra protects records by ensuring:

● All data stored on the patient’s device is encrypted
● No personal identifiers ever pass through Lokra systems
● Records can be verified for integrity when viewed by clinicians
● People choose when and where their health information is shared

There is no central database to attack and no large-scale target for misuse.