Model Security

We understand that your uploaded transcripts may contain highly sensitive and confidential information. That's why we are dedicated to ensuring your information remains 100% private and secure. Here's how we protect your data:

Blockchain-Supported Encryption

All user data is encrypted and tokenized into blocks, then securely transmitted to AWS. Once the computation is complete, all data associated with the request will be permanently removed.

Full-Stack Cloud Computation Process

Our algorithms and models are built on a robust AWS cloud infrastructure, ensuring top-tier security. Utilizing advanced encryption and continuous monitoring (e.g. AWS Shield, IAM, WAF, EBS[1]), we protect your data 24/7 throughout the entire computation process.

Non-Storage Principle

We never store user data; the entire process operates in "Black Box Mode". We are only notified if the computation process fails. Otherwise, the specified email address is the sole recipient of the results.

Strict Confidentiality Standards

We understand the sensitivity of your business data. Our strict confidentiality standards ensure that your meeting notes and transcripts are handled with the utmost care. Please read our Privacy Policies to learn more.

1. We use AWS Key Management Service (KMS) for encryption key management and Amazon EBS encryption to safeguard data during processing. Additionally, any temporary encrypted data storage uses Amazon S3 Encryption for enhanced security. AWS Identity and Access Management (IAM) allows us to securely control access to our AWS services and resources, ensuring that only authorized processes can handle sensitive data. AWS Shield and AWS Web Application Firewall (WAF) protect against DDoS attacks and other web exploits, maintaining the integrity and availability of our applications.

radio_button_checked
mic

Switch audio input device

arrow_drop_down

Loading...

Hide