Security
VoiceToMany is designed with practical security controls suitable for enterprise use. This page summarizes our approach at a high level.
Authentication
User accounts and protected pages require authentication. Speaker operations are scoped to the owner account.
Isolation
Sessions are isolated by speaker/session identifiers. Client access can be auto-approved or manually approved.
Logging
Operational logs help diagnose issues and monitor service health. Sensitive secrets should never be logged.
Data retention
Retention depends on configuration and customer requirements (e.g., keeping minimal metadata vs. storing transcripts).
For enterprise security questionnaires (SSO, audit logs, retention, etc.), contact
sales@voicetomany.com.