Trust & security

Thout.AI is built from the ground up to securely handle your most sensitive meeting data, integration credentials, and service connections.

Our team's security expertise

Our engineering team has deep experience building and operating cloud-native products on Google Cloud Platform and AWS that handle mission-critical business data. We apply enterprise-grade security practices at every layer — from network architecture to application code.

How Thout.AI protects your data

Infrastructure & network security

  • All services run on Google Cloud Run — isolated, fully managed compute with built-in DDoS protection, TLS termination, and request throttling.

  • Data is encrypted at rest (AES-256) and in transit (TLS 1.2+) across all storage and communication layers.

  • Production runs within a dedicated VPC with private subnets, strict firewall rules, Cloud NAT, and Private Google Access — databases have zero public internet exposure.

  • Database connections use Private Service Connect (PSC) endpoints — data never traverses the public internet.

  • Administrative access requires Identity-Aware Proxy (IAP) — no SSH keys or public IPs.

Isolation & access control

  • Every service runs in its own isolated container with a dedicated service account following least privilege. Meeting bots operate in fully sandboxed environments.

  • Production and staging are fully separated — distinct GCP projects, VPCs, and service accounts.

  • CI/CD pipelines use Workload Identity Federation with short-lived OIDC tokens — no long-lived credentials in CI systems.

Authentication & credentials

  • JWT-based authentication with short-lived access tokens (60-min) and secure refresh token rotation (30-day).

  • OAuth 2.0 with Google and Microsoft for SSO — we never store your OAuth passwords.

  • bcrypt password hashing with salting.

  • Integration credentials (Jira, Slack, Gmail) are encrypted with Fernet symmetric encryption.

  • All secrets managed through Google Cloud Secret Manager. Service-to-service auth uses OIDC tokens — no long-lived keys.

Your data stays yours

  • We never sell your data and it is never used to train third-party AI models.

  • Customer data is only shared with sub-processors as strictly necessary to deliver our service.

  • Meeting data is only accessed by the Thout.AI team with your permission, revocable anytime from settings.

  • Audio and video files are stored in user-isolated directories with time-limited signed URLs — never publicly accessible.

Sub-processors

We keep both the sub-processors we use and the data we send to them to an absolute minimum.

Sub-processor

Sub-processor

Google Cloud Platform

Infrastructure, compute, storage, and secret management

MongoDB Atlas

Primary database (connected via Private Service Connect — no public internet)

OpenAI

AI model provider for meeting insights and chat

Pyannote

Audio processing: Audio Diarization

Groq

LLM Inference provider used for insight generation and audio processing

Neo4J

Graph Database used for advanced extraction of insights and addressing queries

Pinecone

Vector database for semantic search

Redis (Cloud Memorystore)

Caching layer (fully VPC-isolated)

Compliance

Standard

Status

SOC 2 Type I

In progress

Data residency

All Thout.AI infrastructure is hosted in Google Cloud within Google's highly secure and compliant data centers. Google Cloud maintains certifications including SOC 1/2/3, ISO 27001, ISO 27017, ISO 27018, and FedRAMP.

Vulnerability disclosure

If you have found a vulnerability in our software, we encourage you to report it so we can work with you to resolve the issue.

Disclosure policy:

  • We will make a reasonable effort to fix the vulnerability promptly after notification.

  • Please do not disclose to third parties until we have had reasonable time to fix the issue.

  • Only use accounts you own or have explicit permission to use.

  • Make a good faith effort to avoid privacy violations, degradation of service, or data loss.

  • Report bugs to security@thout.ai. Bug bounties may be available at our discretion.

Exclusions: DoS attacks, spamming, social engineering of Thout.AI employees/clients/users, and physical attacks.

Deleting your account & data

You can permanently delete your account and all associated data at any time through account settings. We perform a cascading hard delete — removing your profile, meetings, transcripts, audio/video files, integration credentials, and all associated data. This action cannot be undone.