Privacy Policy

VoiceOps, Inc. – Security & Privacy Overview Last Updated:
February 12, 2025

Our Commitment to Security & Privacy

At VoiceOps, Inc., we are committed to protecting customer data through industry-leading security practices. Our web application is designed with robust security controls to safeguard high-volume customer interactions while ensuring compliance with regulatory requirements.

Security Measures & Protections

  • Access Controls: We implement Role-Based Access Control (RBAC) to restrict data access to authorized personnel only. Additionally, access to our AWS infrastructure requires Multi-Factor Authentication (MFA) to ensure secure management of cloud resources.
  • Data Encryption: All customer data is encrypted both in transit and at rest using AES-256 encryption and TLS 1.2/1.3 protocols to prevent unauthorized access.
  • Redaction & Secure Deletion: Personally Identifiable Information (PII) is automatically redacted from both transcripts and audio files before AI processing, and original audio files containing PII are permanently deleted post-redaction to mitigate data exposure risks.
  • Network Security: Our infrastructure is continuously monitored for vulnerabilities, with firewalls, intrusion detection systems (IDS), and automated threat detection mechanisms in place to detect and prevent unauthorized access.
  • Incident Response & Monitoring: VoiceOps maintains a Security Incident Response Plan (SIRP) to promptly address potential security breaches. We conduct regular security audits, penetration testing, and real-time monitoring to detect anomalies.

Data Usage & Protection

  • Minimal Data Collection: We only collect the data necessary for service functionality and compliance monitoring.
  • Strict Data Handling Policies: All data is processed under strict security policies and is never shared or sold to third parties.
  • Fraud Prevention & Risk Management: Our security framework includes fraud detection mechanisms to identify and mitigate risks proactively.

Data Retention & Compliance

  • Retention Policy: Redacted transcripts are retained only as long as necessary for service functionality and compliance.
  • Regulatory Compliance: We adhere to SOC 2 Type II standards, ensuring secure data handling, retention, and disposal.
  • Secure Data Disposal: Data is deleted in accordance with best practices, following secure erasure protocols to prevent residual data exposure.