Your meeting data is encrypted end-to-end, purged automatically, and never used for AI training. Here is exactly how we protect it.
Per-user keys. Even we cannot read your data.
Ephemeral data deleted when meetings end. Signed certificates prove it.
Audit logging, access controls, and incident response procedures.
When you register, a unique 256-bit Data Encryption Key (DEK) is generated for you. This key is encrypted using a key derived from your password via PBKDF2 (100,000 iterations, SHA-256). Your DEK is never stored in plaintext.
Every piece of sensitive data — transcripts, AI responses, documents, briefings, working memory — is encrypted individually with your DEK before being written to our database. Even with full database access, your content cannot be read without your password.
All connections use TLS 1.2 or higher. We enforce HSTS with a 1-year max-age. Cookies are httpOnly, secure, and sameSite: lax.
Passwords are hashed with bcrypt (12 rounds) and compared using timing-safe functions to prevent timing attacks.
API keys are hashed with HMAC-SHA256 before storage. We never store plaintext keys. All comparisons use crypto.timingSafeEqual().
When a meeting ends, the following data is permanently and irreversibly deleted:
Every deletion generates a cryptographically signed certificate documenting:
Verify any deletion certificate via our API at GET /api/certificates/:id.
When you delete your account, all associated data is permanently removed. Each meeting receives its own deletion certificate.
Sessions use JWT tokens stored in httpOnly cookies with 7-day expiry. Rate limiting protects all authentication endpoints: 10 login attempts per 5 minutes, with Redis-backed tracking per IP.
Tenant data is strictly isolated. API keys are scoped to specific tenants with granular permissions. Meeting ownership is verified on every request.
All webhooks are verified with HMAC-SHA256 signatures and timestamp-based replay protection (5-minute window).
We maintain a tamper-evident audit trail of security-relevant events:
Each audit log entry records the action, actor, affected resource, IP address, and user agent. Audit logs are append-only.
Strict-Transport-Security — HSTS with 1-year max-ageContent-Security-Policy — restricts script, style, and connection sourcesX-Frame-Options: DENY — prevents clickjackingX-Content-Type-Options: nosniff — prevents MIME sniffingReferrer-Policy: strict-origin-when-cross-originPermissions-Policy — camera and geolocation disabled, microphone self-onlyAll structured logs automatically redact sensitive fields: passwords, tokens, API keys, authorization headers, and cookies.
| Processor | Purpose | Data Retention | Compliance |
|---|---|---|---|
| OpenAI | AI responses (text & voice) | API data not used for training | SOC 2 Type II |
| Recall.ai | Meeting bot (joins video calls) | No retention | SOC 2, ISO 27001, GDPR, HIPAA |
| Deepgram (opt-in) | Enhanced transcription | Zero retention | SOC 2 Type II, HIPAA, GDPR |
| Render | Application & database hosting | Encrypted at rest | SOC 2 Type II |
We do not sell your data. We do not use your meeting content to train AI models.
We follow a structured incident response process:
Automated monitoring for anomalous authentication patterns, unexpected data access, and infrastructure alerts.
Incidents classified by severity (P1-P4). P1 (data breach) triggers immediate response. P2 (potential exposure) within 4 hours.
Isolate affected systems, revoke compromised credentials, patch vulnerabilities. All actions logged in the audit trail.
Affected users notified within 72 hours (GDPR). Systems restored from verified backups. Post-incident review within 5 business days.
To report a security vulnerability, email security@aimeetings.net. We respond within 24 hours.
Last updated: March 22, 2026 · Questions? Email security@aimeetings.net