Trust Center

Security and privacy at Epilude

How we protect the data you trust us with, who we work with to deliver the product, and how we respond when something goes wrong. We collect only what the product needs and encrypt it in transit and at rest.

Your data stays yours

We do not sell your audio or transcripts. Your content is processed to deliver the product, not to train third-party models without your consent.

Encrypted in transit and at rest

Customer data is encrypted when it travels across the network and when it sits in our datastores.

Built on trusted infrastructure

We run on AWS and a small set of carefully chosen subprocessors, each disclosed publicly on this site.

Compliance

Security and compliance controls

Our security controls and how they map to GDPR. Click a category to see what is in place today.

Subprocessors

Epilude uses a small set of trusted third-party services, called subprocessors, to operate the product and support customers. The complete current list is below. We update this list whenever our subprocessors change. For details on how we handle the data these subprocessors process, see our Privacy Policy.

  • Amazon Web Services (AWS)
    Purpose
    Cloud Infrastructure
    Location
    US
  • Anthropic
    Purpose
    Large Language Model Provider
    Location
    US
  • Deepgram
    Purpose
    Speech-to-Text
    Location
    US
  • Eleven Labs
    Purpose
    Text-to-Speech
    Location
    US
  • Metabase
    Purpose
    Site and Product Analytics
    Location
    US (self-hosted on Railway)
  • OpenAI
    Purpose
    Speech-to-Text and Large Language Model Provider
    Location
    US
  • Slack
    Purpose
    Customer Support
    Location
    US
  • Stripe
    Purpose
    Payment Processing
    Location
    US
  • Supabase
    Purpose
    Authentication Provider
    Location
    US

Reporting a vulnerability

If you believe you have found a security vulnerability in Epilude, email security@epilude.com with as much detail as you can share, including reproduction steps and any proof-of-concept material.

We ask that researchers act in good faith: do not access more data than is necessary to demonstrate the issue, do not degrade or disrupt our service, and give us reasonable time to investigate and remediate before disclosing publicly. We will respond to legitimate reports as quickly as we can and keep you informed of progress.

Frequently asked questions

Common questions from security reviewers, prospects, and customers. If you do not see what you are looking for, reach us at security@epilude.com.

Certifications

What security and privacy certifications does Epilude have?

Epilude is working toward a SOC 2 attestation. We do not yet hold a SOC 2 report, and no certification is claimed today. We will publish status updates here as we progress.

Epilude does not store, process, or transmit payment card information directly. All payment card transactions are handled by PCI DSS–compliant third-party payment processors. As a result, Epilude’s PCI DSS scope is limited, and applicable compliance obligations are met through our payment processing partner, Stripe.

Epilude complies with applicable data protection and privacy laws, including the EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), where they apply.

Epilude maintains processes and controls to support data subject rights, lawful data processing, and transparency obligations. No formal external certification is required for compliance with these regulations.

Security Operations

How is access to systems managed?

We adhere to the principle of least privilege, giving team members access only to the information necessary for their job functions. Requests for privilege escalation require documented approval by an authorized manager, and we perform regular audits of access privileges to sensitive applications.

How are security incidents handled?

We maintain an incident response plan that defines responsibilities, detection methods, and corrective actions during security incidents. We use monitoring tools for early detection, and we test, review, and update the plan at least annually.

What safeguards exist for source code changes?

We log, time-stamp, and attribute source code changes to their author in our source code management tool. We restrict access to the tool to authorized users with multi-factor authentication.

How is multi-factor authentication implemented?

We enforce multi-factor authentication (MFA) for user accounts with access to company email, version control tools, and cloud infrastructure.

What is your approach to security patching?

We patch and update all systems on a documented, regular, and timely schedule, using the Common Vulnerability Scoring System (CVSS) to set patching guidelines. We address critical security vulnerabilities as soon as possible regardless of CVSS score.

How often do employees receive security awareness training?

Our employees complete mandatory security awareness training continuously, and we maintain records of completion.

Risk Management

How do we manage risks associated with third-party vendors?

We actively manage vendor risks through a structured approach that includes maintaining a critical third-party vendor inventory and conducting risk assessments before initiating third-party work. We repeat these assessments annually to identify any gaps between third-party security controls and our information security standards.

What types of exercises are conducted to test business continuity plans?

We perform periodic tests, which can include tabletop sessions, disaster simulations, or other realistic scenarios. After each test, we create an assessment report indicating the success of the exercise and any required corrective actions.

How do you monitor vendor performance and compliance?

We review SOC 2 reports from service providers at onboarding and annually to assess the appropriateness of scope and the impact of identified exceptions. For critical vendors without SOC 2 reports but with access to company data, we perform regularly scheduled risk assessments to evaluate performance and compliance with security commitments.

Data Handling

What data does Epilude collect?

We collect three broad categories of data to deliver the product. Audio and transcripts are captured when you press to dictate; we send the audio to a speech-to-text service and return the transcript to your Mac. Account information includes your email address, authentication credentials, and basic profile details you provide. Usage and diagnostic data is anonymous information about how you use the app, including errors, crashes, and performance metrics.

Captured audio is treated as Customer Content under our Privacy Policy.

Where is my data stored?

Most processing happens through a small set of trusted subprocessors. The full list, with each subprocessor’s purpose and location, is in the Subprocessors section above.

Audio is sent to our speech-to-text providers to produce transcripts and is deleted from the provider in line with their data-handling commitments. Transcripts may be sent to a large language model provider for formatting or auto-editing when you use those features. Account credentials are managed by our authentication provider. Payment information is handled directly by our payment processor; we do not store full card numbers. Product analytics flow through a self-hosted service so the underlying data stays on infrastructure we control.

How is data encrypted during transmission and storage?

We encrypt all sensitive data in transit using industry-standard protocols like TLS 1.3. Data at rest is encrypted using AES-256, and we manage encryption keys securely in a KMS.

Do you use my audio or transcripts to train AI models?

No. We do not train any models on your data, and the speech-to-text and large language model providers we use are configured not to train on it either.

How do you handle data subject access requests?

We have established procedures to respond to data subject requests within regulatory timeframes. We authenticate requests to verify identity, and we provide data in a commonly used, machine-readable format. We log and track all requests for compliance purposes.

What is your data retention and deletion policy?

We retain data only for as long as necessary to fulfill business purposes or comply with legal requirements. When data is no longer needed, we securely delete it using approved methods that prevent recovery. We run regular audits to confirm compliance with retention schedules.

Policies

The legal documents that govern how we work with you and how we handle your data.

Have a security question?

Reach our security team directly. We respond to legitimate inquiries promptly.
security@epilude.com