Protecting your data
We’re committed to the security of your data and provide multiple layers of protection for the personal information you trust to Sonix.
Security and Privacy for your data
We value privacy as much as you do
We build privacy into everything we do. It's not an afterthought. It's how we choose to treat, and respect, our customers on a daily basis. We do not sell, rent or share your information with third parties for their promotional use.
You control access
You will always have access to your files. Should you end your subscription you will lose other functionality like editing but you will always be able to view, export, and download. You can also delete the information if you don't want to store it on Sonix anymore at anytime. When you remove it, we delete the audio and the transcription from our platform completely.
Note that we have share functionality that allows you to share a transcript. If you share this link with someone else, they will be able to share with others as well.
Security: Technical details
Data transfer encryption
We encrypt all data that goes between you and Sonix using field-standard TLS (Transport Layer Security). Your data is encrypted when transferred between data centers for backup and replication.
Data storage encryption
We use server-side encryption with one of the strongest block ciphers available, 256-bit Advanced Encryption Standard (AES-256). This cipher secures both our database and your data at rest.
Sonix has multiple layers of security including firewalls, intrusion protection systems and network segregation. Sonix’s security services are configured, monitored, and maintained according to field best practices. We partner with field-leading security vendors to leverage their expertise and global threat intelligence.
Secure data centers
Sonix’s servers are located within enterprise-grade hosting facilities that have robust physical security controls to prevent physical access. These controls include 24/7/365 monitoring and surveillance, on-site security staff and regular ongoing security audits.
Security teams continuously monitor security systems, event logs, notifications and alerts from all systems to identify and manage threats.