Your knowledge is
secure by default.
We employ bank-grade security protocols, ensuring your audio, transcripts, and organizational intelligence never leave your control.
SOC2 Type II &
Zero Data Usage
We process your data securely, encrypt it at rest using AES-256, and under no circumstances do we use your corporate meeting data to train public LLMs.
- check SOC2 Type II Certified
- check ISO 27001 Compliant
- check Single Sign-On (SAML/OAuth)
Comprehensive Protection
Every layer of our infrastructure is designed to defend your most sensitive organizational knowledge.
Encryption Everywhere
All data is encrypted in transit using TLS 1.3 and at rest with AES-256 block-level encryption. Key management is handled securely via AWS KMS.
Data Residency
Choose where your data lives. We offer dedicated hosting regions in the US, EU (Frankfurt), and APAC (Sydney) to comply with local laws.
Audit Trails
Maintain complete visibility. Every read, write, and access event is logged immutably and exportable via our Enterprise API for SIEM ingestion.
Strict RBAC
Enforce least-privilege access. Granular Role-Based Access Controls sync with your IdP via SCIM to automatically manage employee lifecycles.
Vulnerability Management
Continuous automated container scanning, static code analysis (SAST), and annual third-party penetration testing by independent security firms.
Privacy Frameworks
Fully compliant with global privacy frameworks including GDPR and CCPA. We provide out-of-the-box tools for Data Subject Access Requests (DSAR).
Security FAQ
psychology Do you train AI models on my meeting data?
Absolutely not. We have strict, legally binding Zero Data Retention policies with our foundational model providers. Your telemetry and transcript data is never used to improve public models or shared across tenants.
domain Where is my data physically located?
By default, all tenant data is isolated and stored in AWS US-East (N. Virginia). Enterprise customers can select dedicated deployments in Europe (Frankfurt, Ireland) or Asia-Pacific (Sydney, Tokyo) to meet strict data residency requirements.
key Can I manage my own encryption keys?
Yes. AudioToNotes Enterprise supports Dedicated Key Management (EKM/BYOK). You can wrap your tenant's master key with a key you control via AWS KMS, allowing you to instantly revoke access to all data at any time.