Record Meeting keeps your data safe

We keep security at the heart of our product, infrastructure, and company policies. Thousands of users trust Record Meeting to securely record and transcribe their meetings.

Protecting Your Data and Privacy

Record Meeting maintains strict security standards and procedures to keep your recordings and data safe.

Data Security

Industry-standard data protection, secure infrastructure, and third-party verification ensures your recordings and transcripts are protected at every step.

Data Ownership

Your data is yours—we do not, and will not, sell your or your team's information. We don't help third parties advertise their products to you.

Secure Infrastructure

Record Meeting's infrastructure is built to protect your data according to high industry standards.

Data Hosting

Record Meeting hosts data in Google Cloud Platform data centers in US East and US West regions and ensures continual product availability using native backup tools. An industry-leading infrastructure provider, GCP is certified as compliant with ISO 27001 and has received SOC 2 (Type 2) and 3 reports.

Data Encryption

Record Meeting encrypts all data in transit and at rest. Data transfer is protected using the industry-standard TLS 1.2 protocol, while data at rest is encrypted using AES-256 server-side encryption. Record Meeting uses GCP IAM Service for database encryption and secure key management.

Cloud Platform

All components that process your data operate in Record Meeting's private network inside our secure cloud platform, and each user's data is isolated from other users' data. Our servers and network ports are behind load balancers and a web application firewall.

Third-Party Validation

Automated Perimeter Testing

All assets in scope are continuously monitored using the GCP Security Command Center. Reports are available upon request.

Vulnerability Disclosure Policy

We welcome all external security researchers to disclose vulnerabilities in a responsible manner through our Vulnerability Disclosure Policy.

Google User Data Policy

The use of raw or derived user data received from Workspace APIs adheres to the Google User Data Policy, including the Limited Use requirements.

Have a Security Question?

We're happy to discuss our security practices in detail. Reach out to our team for more information.