Security and privacy details for enterprise procurement and risk reviews.
Access control, multi-tenant isolation, encryption, and auditability.
Data handling, retention controls, and responsible processing of conversation data.
Data residency options, infrastructure model, and retention configuration.
Terms of service, data processing agreements, and subprocessor information.
We scope access by organisation, role, and product context.
Audio files and their transcriptions are stored securely and scoped to the uploading organisation.
Scores, tags, compliance results, and reports generated from call analysis.
User accounts, role assignments, and product-level permissions within each organisation.
We provide procurement documents on request.
Available on request for procurement and risk review processes.
DPA available on request for data processing requirements.
List of third-party services used in the processing pipeline.
High-level incident response process and escalation procedures.
Bring a call sample, your scripts or non-negotiables, and your current QA process.
Book a Demo