Privacy Policy
VoiceOps, Inc. – Security & Privacy Overview Last Updated:
February 12, 2025
Our Commitment to Security & Privacy
At VoiceOps, Inc., we are committed to protecting customer data through industry-leading security practices. Our web application is designed with robust security controls to safeguard high-volume customer interactions while ensuring compliance with regulatory requirements.
Security Measures & Protections
- Access Controls: We implement Role-Based Access Control (RBAC) to restrict data access to authorized personnel only. Additionally, access to our AWS infrastructure requires Multi-Factor Authentication (MFA) to ensure secure management of cloud resources.
- Data Encryption: All customer data is encrypted both in transit and at rest using AES-256 encryption and TLS 1.2/1.3 protocols to prevent unauthorized access.
- Redaction & Secure Deletion: Personally Identifiable Information (PII) is automatically redacted from both transcripts and audio files before AI processing, and original audio files containing PII are permanently deleted post-redaction to mitigate data exposure risks.
- Network Security: Our infrastructure is continuously monitored for vulnerabilities, with firewalls, intrusion detection systems (IDS), and automated threat detection mechanisms in place to detect and prevent unauthorized access.
- Incident Response & Monitoring: VoiceOps maintains a Security Incident Response Plan (SIRP) to promptly address potential security breaches. We conduct regular security audits, penetration testing, and real-time monitoring to detect anomalies.
Data Usage & Protection
- Minimal Data Collection: We only collect the data necessary for service functionality and compliance monitoring.
- Strict Data Handling Policies: All data is processed under strict security policies and is never shared or sold to third parties.
- Fraud Prevention & Risk Management: Our security framework includes fraud detection mechanisms to identify and mitigate risks proactively.
Data Retention & Compliance
- Retention Policy: Redacted transcripts are retained only as long as necessary for service functionality and compliance.
- Regulatory Compliance: We adhere to SOC 2 Type II standards, ensuring secure data handling, retention, and disposal.
- Secure Data Disposal: Data is deleted in accordance with best practices, following secure erasure protocols to prevent residual data exposure.