Legal

Security

Your recordings, transcripts, and repurposed content are handled with care. Here's exactly how Glyph protects your data at every stage of the pipeline.

Last updated: 1 March 2026

01

Data Encrypted in Transit and at Rest

All data transmitted between your browser and Glyph's servers is encrypted using TLS 1.2+. Your recordings, transcripts, and generated content are encrypted at rest using AES-256. No audio or transcript data is ever transmitted unencrypted.

02

Your Recordings Stay Yours

We do not sell, license, or share your audio files, transcripts, or AI-generated outputs with third parties. Your content is processed solely to deliver the Service. We do not use your recordings or transcripts to train AI models without your explicit written consent.

03

Isolated Processing Per User

Every transcription and repurposing job is processed in an isolated context. Your recordings are never co-mingled with other users' data during processing. Outputs are scoped entirely to your account.

04

Minimal Data Retention

Audio files are deleted from our processing pipeline after transcription is complete. Transcripts and generated content are retained only as long as your account is active or as required to deliver the Service. You can delete any recording and all associated data from your account at any time.

05

Access Controls

Access to production systems is restricted to a small number of authorised engineers. All internal access is logged and audited. We enforce multi-factor authentication across all internal tooling and production infrastructure.

06

Third-Party Sub-Processors

Glyph uses a small number of vetted sub-processors to deliver core functionality — including cloud hosting, AI inference, and payment processing. Each sub-processor is bound by data processing agreements and is reviewed for security posture before use.

How your data moves through Glyph

Understanding exactly what happens to your audio from upload to output.

01

You upload a recording

Your audio or video file is transmitted over an encrypted TLS connection directly to our secure cloud storage. The file is associated only with your account.

02

Transcription runs in an isolated job

A transcription job is created scoped to your recording. It runs in an isolated compute environment. No other user's data is involved. The resulting transcript is stored encrypted, associated with your account only.

03

Summarisation & repurposing

When you generate show notes, blog posts, social content, or any repurposed output, your transcript is passed — encrypted in transit — to an AI inference layer. The system prompt and context are scoped to your request only. Outputs are stored in your account.

04

You publish or export

You control what gets published. Glyph never automatically publishes on your behalf. Exported content leaves our system under your direction.

05

Deletion

When you delete a recording, all associated transcripts, summaries, clips, and generated content are permanently deleted from our systems. Audio files from completed transcriptions are purged automatically from our processing pipeline.

Responsible AI use

Glyph uses large language models to power transcription summarisation, content repurposing, and archive search. We are committed to using these capabilities responsibly:

  • No training on your data. We do not use your recordings, transcripts, or generated outputs to train or fine-tune any AI model without your explicit written consent.
  • Outputs require human review. AI-generated transcripts, summaries, and content drafts are provided for editorial use. You are responsible for reviewing and approving all content before publication.
  • No autonomous publishing. Glyph never publishes, posts, or distributes content on your behalf without a deliberate action from you.
  • Transparency about AI involvement. All AI-generated outputs are clearly labelled as such within the platform. We do not obscure the role of AI in the content creation process.

Responsible Disclosure

If you discover a security vulnerability in Glyph, we ask that you report it to us privately before disclosing it publicly. We commit to acknowledging your report within 2 business days and working towards a fix promptly.

Report a vulnerability

security@joinglyph.com

This page describes our current security practices and is updated when significant changes occur. For questions about how Glyph handles your data, contact security@joinglyph.com. For our full data handling practices, see our Privacy Policy.