Protecting Your data

We’re committed to the security of your data and provide multiple layers of protection for the personal information you trust to Vidomo.

We value privacy

We build privacy into everything we do. It's not an afterthought. It's how we choose to treat, and respect, our customers on a daily basis. We do not sell, rent or share your information with third parties for their promotional use.

Employees do not have access to your audio, video, and transcripts unless you give us permission.

You control access

You will always have access to your files. Should you end your subscription you will lose other functionality like editing but you will always be able to view, export, and download. You can also permanently remove the video file and transcript from Vidomo anymore at anytime.

Note that we have share functionality that allows you to share a transcript. If you share this link with someone else, they will be able to share it with others as well.

Security Technical Details

Data transfer encryption

We encrypt all data that goes between you and Vidomo using field-standard TLS (Transport Layer Security). Your data is encrypted when transferred between data centers for backup and replication.

Data storage encryption

We use server-side encryption with one of the strongest block ciphers available, 256-bit Advanced Encryption Standard (AES-256). This cipher secures both our database and your data at rest.

Network protection

Vidomo has multiple layers of security including firewalls, intrusion protection systems and network segregation. Vidomo’s security services are configured, monitored, and maintained according to field best practices. We partner with field-leading security vendors to leverage their expertise and global threat intelligence.

Secure data centers

Vidomo’s servers are located within enterprise-grade hosting facilities that have robust physical security controls to prevent physical access. These controls include 24/7/365 monitoring and surveillance, on-site security staff and regular ongoing security audits.

Security monitoring

Security teams continuously monitor security systems, event logs, notifications and alerts from all systems to identify and manage threats.