Legal
Your recordings, transcripts, and repurposed content are handled with care. Here's exactly how Glyph protects your data at every stage of the pipeline.
Last updated: 1 March 2026
All data transmitted between your browser and Glyph's servers is encrypted using TLS 1.2+. Your recordings, transcripts, and generated content are encrypted at rest using AES-256. No audio or transcript data is ever transmitted unencrypted.
We do not sell, license, or share your audio files, transcripts, or AI-generated outputs with third parties. Your content is processed solely to deliver the Service. We do not use your recordings or transcripts to train AI models without your explicit written consent.
Every transcription and repurposing job is processed in an isolated context. Your recordings are never co-mingled with other users' data during processing. Outputs are scoped entirely to your account.
Audio files are deleted from our processing pipeline after transcription is complete. Transcripts and generated content are retained only as long as your account is active or as required to deliver the Service. You can delete any recording and all associated data from your account at any time.
Access to production systems is restricted to a small number of authorised engineers. All internal access is logged and audited. We enforce multi-factor authentication across all internal tooling and production infrastructure.
Glyph uses a small number of vetted sub-processors to deliver core functionality — including cloud hosting, AI inference, and payment processing. Each sub-processor is bound by data processing agreements and is reviewed for security posture before use.
Understanding exactly what happens to your audio from upload to output.
You upload a recording
Your audio or video file is transmitted over an encrypted TLS connection directly to our secure cloud storage. The file is associated only with your account.
Transcription runs in an isolated job
A transcription job is created scoped to your recording. It runs in an isolated compute environment. No other user's data is involved. The resulting transcript is stored encrypted, associated with your account only.
Summarisation & repurposing
When you generate show notes, blog posts, social content, or any repurposed output, your transcript is passed — encrypted in transit — to an AI inference layer. The system prompt and context are scoped to your request only. Outputs are stored in your account.
You publish or export
You control what gets published. Glyph never automatically publishes on your behalf. Exported content leaves our system under your direction.
Deletion
When you delete a recording, all associated transcripts, summaries, clips, and generated content are permanently deleted from our systems. Audio files from completed transcriptions are purged automatically from our processing pipeline.
Glyph uses large language models to power transcription summarisation, content repurposing, and archive search. We are committed to using these capabilities responsibly:
If you discover a security vulnerability in Glyph, we ask that you report it to us privately before disclosing it publicly. We commit to acknowledging your report within 2 business days and working towards a fix promptly.
Report a vulnerabilitysecurity@joinglyph.com
This page describes our current security practices and is updated when significant changes occur. For questions about how Glyph handles your data, contact security@joinglyph.com. For our full data handling practices, see our Privacy Policy.