Support

Help, Support, and Contact

Lakesis provides support for implementation questions, Zoom integration issues, booking workflow incidents, privacy requests, and marketplace review follow-up. We keep support instructions simple and reachable from our main website.

Primary intake: [email protected] Privacy: [email protected] Use subject keywords: Support, Security, Privacy

How to Reach Us

General Support

Email [email protected] and include the issue type, organization name, and any affected booking or integration context.

Implementation Questions

For onboarding, configuration, or workflow design questions, include your intended use case and target timeline so we can route the request correctly.

Security or Privacy

Use [email protected] for privacy matters and [email protected] for security-related product issues. Mark the subject as Security or Privacy and include enough detail for triage. See also our Security page.

Marketplace Review Follow-up

If a platform reviewer asks for clarification, reference the relevant marketplace, submission stage, and the exact question so we can answer quickly.

What to Include in a Support Request

  • your organization name and main contact;
  • the affected environment, workflow, or integration;
  • screenshots or timestamps where relevant;
  • the expected behavior versus the actual behavior; and
  • the urgency and business impact.

Response Approach

We review support requests on business days and prioritize issues based on business impact and service risk. Requests involving production availability, security exposure, or broken customer-facing workflows are triaged ahead of general how-to questions or feature suggestions.

This page describes our support approach for transparency. It is not a separate contractual SLA unless agreed in writing.

Responsible Disclosure

If you believe you have found a vulnerability in the Lakesis website, platform, or Zoom integration behavior, please report it to [email protected] and clearly label it as a security issue. Do not attempt to access data that is not yours, interrupt service, or perform destructive testing.