Trust

Trust and governance

Security and privacy details for enterprise procurement and risk reviews.

What we protect

We scope access by organisation, role, and product context.

Call recordings and transcripts

Audio files and their transcriptions are stored securely and scoped to the uploading organisation.

Analysis outputs

Scores, tags, compliance results, and reports generated from call analysis.

User and role access

User accounts, role assignments, and product-level permissions within each organisation.

Procurement documents

We provide procurement documents on request.

Security pack

Available on request for procurement and risk review processes.

Data processing addendum

DPA available on request for data processing requirements.

Subprocessors list

List of third-party services used in the processing pipeline.

Incident response overview

High-level incident response process and escalation procedures.

Want to see how Vootery flags compliance misses and deal killers in under a minute?

Bring a call sample, your scripts or non-negotiables, and your current QA process.

Book a Demo