Privacy, Security & Data
How your information is protected.
Articles
- Business Continuity & Disaster Recovery
- Incident Response & Breach Notification
- Data Security & Encryption
- Vulnerability Disclosure & Bug Bounty Policy
- Security Overview
- How to Request Access to Wispr's SOC 2 Type II Report
- Subprocessors & Third-Party Security
- HIPAA Compliance & Healthcare Use
- Compliance Certifications & Standards
- Accessibility Permission on Android
- Enable HIPAA support and Zero Data Retention (ZDR) in Wispr Flow
- Context Awareness
- Timeline for New SOC 2 Audit
- Access Controls & Authentication
- Privacy Mode & Data Retention