Record Meeting keeps your data safe
We keep security at the heart of our product, infrastructure, and company policies. Thousands of users trust Record Meeting to securely record and transcribe their meetings.
Enterprise-Grade Compliance
Protecting Your Data and Privacy
Record Meeting maintains strict security standards and procedures to keep your recordings and data safe.
Data Security
Industry-standard data protection, secure infrastructure, and third-party verification ensures your recordings and transcripts are protected at every step.
Data Ownership
Your data is yours—we do not, and will not, sell your or your team's information. We don't help third parties advertise their products to you.
Secure Infrastructure
Record Meeting's infrastructure is built to protect your data according to high industry standards.
Data Hosting
Record Meeting hosts data in Google Cloud Platform data centers in US East and US West regions and ensures continual product availability using native backup tools. An industry-leading infrastructure provider, GCP is certified as compliant with ISO 27001 and has received SOC 2 (Type 2) and 3 reports.
Data Encryption
Record Meeting encrypts all data in transit and at rest. Data transfer is protected using the industry-standard TLS 1.2 protocol, while data at rest is encrypted using AES-256 server-side encryption. Record Meeting uses GCP IAM Service for database encryption and secure key management.
Cloud Platform
All components that process your data operate in Record Meeting's private network inside our secure cloud platform, and each user's data is isolated from other users' data. Our servers and network ports are behind load balancers and a web application firewall.
Third-Party Validation
Automated Perimeter Testing
All assets in scope are continuously monitored using the GCP Security Command Center. Reports are available upon request.
Vulnerability Disclosure Policy
We welcome all external security researchers to disclose vulnerabilities in a responsible manner through our Vulnerability Disclosure Policy.
Google User Data Policy
The use of raw or derived user data received from Workspace APIs adheres to the Google User Data Policy, including the Limited Use requirements.
Have a Security Question?
We're happy to discuss our security practices in detail. Reach out to our team for more information.