Getting Started
Privacy Architecture
How Truly protects your data privacy
Privacy Architecture
At Truly, we prioritize data privacy and security. Our architecture is designed to ensure that no private audio or video data is stored on our servers.
Data Flow Diagram
The diagram below illustrates how data flows through our system while maintaining privacy:
Key Privacy Features
No Raw Data Storage
- Voice and Video Data: Raw audio and video files are processed in memory and never stored on our servers
- Vector Representations Only: We only store mathematical vector representations that cannot be reversed to recreate the original audio/video
Client-Controlled Storage
- Optional Storage: Clients can choose to store data in their own AWS S3 or GCP buckets
- Client-Owned Keys: All storage is controlled by client-owned encryption keys
- No Truly Access: Truly has no access to data stored in client buckets
Secure Processing
- In-Memory Processing: All data processing happens in memory
- Encrypted Transit: All data is encrypted in transit using TLS 1.3
- Ephemeral Compute: Processing servers use ephemeral storage that is wiped after each session
Compliance
Our architecture is designed to help you maintain compliance with:
- GDPR
- CCPA/CPRA
- HIPAA (with appropriate BAA)
- SOC 2 Type II
For more information about our security practices, please contact our security team.