Product
Resources
Pricing

Security

Your client conversations deserve serious protection.

Client calls contain the most sensitive information your business handles - plans, budgets, roadmaps, relationships. We built Audora's security posture around that reality, not as an afterthought.

Encryption at rest and in transit
Isolated per-account data environments
No AI training on your data
72-hour recording deletion

Encryption

All data encrypted in transit with TLS 1.3 and at rest with AES-256. No unencrypted data paths exist anywhere in the system.

Data lifecycle

Call recordings are deleted within 72 hours of transcript generation. Transcripts and outputs are deleted 30 days after account closure.

Access control

Role-based access within teams. Your data is never visible to other Audora accounts. Internal access is strictly limited and audited.

Isolation

Each account's data is stored in isolated environments. There is no shared storage layer between accounts at any point in the pipeline.

Infrastructure

Hosted on enterprise-grade cloud infrastructure with redundant availability zones, automated backups, and continuous uptime monitoring.

No training use

We do not use your call recordings, transcripts, or generated outputs to train or fine-tune any AI model - ours or any third party's.

01

Encryption and data in transit

Every byte that moves through Audora is encrypted. No exceptions, no plaintext paths.

All communication between your browser or client and Audora's servers occurs over TLS 1.3, the current industry standard for transport security. Connections using older protocol versions are rejected. We use HSTS (HTTP Strict Transport Security) to prevent protocol downgrade attacks and ensure browsers only connect over HTTPS.

At rest, all data - including call recordings, transcripts, generated documents, and account information - is encrypted using AES-256. Encryption keys are managed separately from the data they protect and are rotated on a regular schedule. Key management follows the principle of least privilege: no single system or individual has access to both encrypted data and the corresponding decryption keys simultaneously.

Transport protocolTLS 1.3 (minimum TLS 1.2)
At-rest encryptionAES-256
Key managementSeparate key management service, regular rotation
HSTSEnabled, max-age 1 year, includeSubDomains
Certificate authorityCertificate pinning on mobile clients

Webhook payloads and any outbound integrations (to Cursor, Linear, Notion, etc.) are also transmitted over encrypted channels. We validate TLS certificates on all outbound connections and do not accept self-signed certificates from integration targets.

02

Data lifecycle and retention

We collect only what we need. We delete it as soon as we are done with it.

Call recordings are the most sensitive data we handle. We treat them accordingly. When a call ends and the Audora bot completes transcription, the original audio recording is scheduled for deletion within 72 hours. This is not a best-effort target - it is an automated, enforced process. The recording is not available after deletion, including to our own team.

Recording lifecycle: Call ends → Bot generates transcript → Audio scheduled for deletion → Deletion confirmed within 72 hours → Only the transcript and generated outputs remain.

Transcripts and generated outputs (PRDs, task lists, SOWs, client briefs) are retained for the duration of your active subscription. When your account is closed or your subscription lapses, data enters a 30-day grace period during which you can export or access it. After 30 days, all data is permanently and irreversibly deleted from our systems.

Audio recordingsDeleted within 72 hours of transcription
Transcripts and outputsRetained for subscription duration + 30 days
Account dataDeleted 30 days after account closure
Billing recordsRetained 7 years for tax compliance
Access logsRetained 12 months for security purposes
Deletion methodCryptographic erasure + secure overwrite

Billing records are the only category of data retained beyond your subscription period, and this retention is required by law for tax and accounting compliance. Billing data does not include call content, transcripts, or outputs of any kind.

03

Access control and authentication

Who can see your data. The answer is: you, your authorized team, and nobody else.

Audora enforces strict role-based access control (RBAC) at both the account and team level. Each subscription account is a fully isolated tenant. There is no administrative interface that allows Audora employees to browse customer data. Access to customer data by Audora staff requires explicit customer authorization, a documented support reason, and generates an immutable audit log entry.

Authentication requirements for your account:

  • Minimum 12-character passwords enforced at account creation
  • Session tokens expire after 24 hours of inactivity
  • All sessions are bound to the originating IP and user agent
  • Concurrent session limits enforced per user seat
  • Failed login attempts trigger progressive rate limiting and lockout
  • Account owners receive email alerts on new device logins

Team seats on Studio and Agency plans can be assigned with scoped permissions. Workspace owners control what each team member can access, including which client profiles, call histories, and outputs are visible to each seat. Permission changes take effect immediately and generate audit log entries.

Audora internal access controls: Our team members access production systems only through time-limited, audited sessions using hardware security keys. No production credentials are stored in code repositories, CI/CD pipelines, or shared password managers. All internal access to infrastructure follows the principle of least privilege - each team member has access only to what their role requires, nothing more.

04

AI processing and your data

We use AI to process your calls. Here is exactly what that means for your data.

Audora uses large language models to generate transcripts, project briefs, PRDs, task breakdowns, and statements of work from your call recordings. We want to be completely transparent about how this works and what protections are in place.

We do not use your data to train AI models. Your call recordings, transcripts, and generated outputs are never used to train, fine-tune, benchmark, or evaluate any AI model - ours or any third party's. This is a contractual and technical commitment, not a policy preference.

When your call data is sent to AI processing infrastructure, it travels over encrypted channels and is processed in isolated, single-use contexts. The AI models we use do not retain conversation context between calls or between users. Each processing request is stateless - the model has no memory of previous requests from your account or any other account.

Our AI infrastructure providers are contractually prohibited from using customer data for model training. These restrictions are explicitly written into our data processing agreements and are auditable.

  • No training use - contractual and technical
  • Stateless AI processing - no cross-account or cross-call context
  • Encrypted data in transit to AI providers
  • Data processing agreements with all AI infrastructure providers
  • Zero-retention policies on AI provider side for customer data
05

Infrastructure and availability

What runs Audora, where it runs, and how we keep it running.

Audora's infrastructure runs on enterprise cloud providers in the United States. We use multiple availability zones to ensure redundancy - if one zone experiences an outage, traffic is automatically routed to healthy zones without manual intervention and typically without any perceptible disruption to users.

Hosting regionUnited States (multi-AZ)
Availability target99.9% monthly uptime
Backup frequencyDaily automated backups, 30-day retention
Recovery time objective< 4 hours for major incidents
Recovery point objective< 24 hours data loss in catastrophic failure
Monitoring24/7 automated alerting and on-call rotation
DDoS protectionNetwork-level and application-level mitigation

All infrastructure changes go through a controlled deployment process with automated rollback capabilities. We do not make ad-hoc changes to production systems. Deployments are staged, tested in an isolated environment that mirrors production, and rolled out incrementally with automated health checks at each stage.

Database instances run on encrypted volumes with point-in-time recovery enabled. Backups are stored in a separate geographic region from the primary data and are tested for restorability on a regular basis. We do not consider untested backups to be valid backups.

06

Subprocessors and third parties

Every vendor that touches your data, and what they are permitted to do with it.

Audora uses a limited set of carefully vetted third-party service providers to operate the platform. Each subprocessor has signed a data processing agreement that restricts their use of customer data to providing the contracted service only. None of our subprocessors are permitted to use your data for their own purposes, including model training, marketing, or analytics.

Our subprocessor categories include:

  • Cloud infrastructure - Hosting, storage, and database services. Data processed in the US.
  • Meeting bot infrastructure - Joins calls, captures audio, and returns raw audio streams to our systems. Subject to zero-retention policy for raw audio after transfer.
  • AI processing - Language model inference for transcription and document generation. Zero-retention policy, no training use.
  • Payment processing - Handles billing and subscription management. Audora never stores raw payment card data.
  • Email delivery - Transactional email only (receipts, alerts, notifications). No marketing use of email addresses without explicit opt-in.
  • Error monitoring - Captures application errors and performance issues. Error reports are scrubbed of personally identifiable information before logging.

We do not sell, share, or trade your data with advertising networks, data brokers, or any party whose purpose is not directly related to delivering the Audora service to you. If we add a new subprocessor that processes customer call data, we will notify affected customers at least 14 days in advance.

07

Incident response

What we do if something goes wrong, and how we communicate it to you.

We maintain a formal incident response plan that covers detection, containment, eradication, recovery, and post-incident review. Our security monitoring runs continuously and alerts our on-call team immediately when anomalous patterns are detected - unusual access volumes, authentication anomalies, unexpected data egress, or infrastructure irregularities.

In the event of a confirmed security incident affecting customer data:

  • We will notify affected customers by email within 72 hours of confirmation
  • Notification will include what data was affected, how, and what we have done about it
  • We will notify applicable regulatory authorities as required by law
  • We will publish a post-incident report within 30 days describing root cause and remediation
  • We will not obscure, minimize, or delay disclosure of confirmed incidents

We do not wait until the investigation is complete to notify customers. If we know your data may have been affected, we tell you immediately with whatever information we have, and we update you as we learn more.

Minor incidents - those affecting service availability without data exposure - are documented in our status page in real time. We maintain a full incident history publicly accessible at our status page so you can evaluate our track record rather than just take our word for it.

08

Recording consent

Your legal obligations when using the Audora bot in calls.

Audora's bot joins your meetings and records audio. Recording laws vary significantly by jurisdiction - some require only one party's consent (the party initiating the recording), while others require all participants to actively consent before recording begins. Several countries outside the US have strict requirements that apply regardless of where the recording party is located.

You are responsible for ensuring all call participants have been informed of and consented to the recording before the Audora bot joins. We cannot and do not verify consent on your behalf. Failure to obtain required consent may expose you to civil or criminal liability under wiretapping, privacy, or surveillance laws applicable in your jurisdiction or your participants' jurisdictions.

The simplest approach: tell participants at the start of the call that the session is being recorded. Most video conference platforms also display a recording indicator to all participants when a bot joins, which provides an implicit notification. We recommend combining both - verbal notice and platform notification - for any call involving participants in jurisdictions you are not certain about.

Audora's Terms of Service require you to comply with all applicable recording laws. We reserve the right to suspend accounts where we have credible evidence of recording without required consent.

Report a vulnerability

If you discover a security vulnerability in Audora, we want to know about it. We take all reports seriously, investigate promptly, and will not pursue legal action against researchers who follow responsible disclosure practices.

Please email us with a description of the vulnerability, steps to reproduce it, and the potential impact. We will acknowledge receipt within 24 hours and aim to resolve confirmed vulnerabilities within 30 days.

Report a vulnerability

Security questions

If you have questions about our security practices, data handling, or need documentation for your own compliance review, reach out to us directly. We are happy to answer specific questions and provide additional detail where our public documentation is insufficient.

For enterprise customers evaluating Audora, we can provide a security questionnaire response and additional technical documentation on request.

Contact us