End-to-end encryption, role-based access controls, 24/7 monitoring, and a documented incident response plan. Customer call data is never used to train shared AI models.
| Category | Provider | Purpose | Data Processed |
|---|---|---|---|
| Telephony | Twilio | Call handling and routing | Call audio, caller ID, metadata |
| Speech-to-Text | Deepgram | Real-time transcription | Call audio |
| LLM | OpenAI / Anthropic | AI response generation | Transcribed text, context |
| Cloud Hosting | AWS | Application and data hosting | All application data |
| Analytics | Internal | Call analytics and reporting | Aggregated call metadata |
Request our security overview, DPA, and subprocessor list for your security review.