Privacy and Security
At Jenson8, we believe AI should make meetings more effective, not more invasive. Our AI meeting facilitator is designed to support better conversations while respecting participant trust, privacy, and control.
We are transparent about how the system works today, and we are continuously improving our privacy and security controls as the product matures.
Our guiding principles
Transparency
Participants are informed when AI support is active and what it is used for.
Control
The meeting host controls when (and whether) AI feedback is shared with participants.
Privacy by Design
We aim to collect only what is necessary to provide the service and to limit how long data is retained.
How It Works
-
Join the meeting
Participants join via a secure web page with embedded video conferencing. Only a nickname is required for participants.
-
Audio processing
Meeting audio is streamed securely to support real-time analysis.
-
AI-generated insights
Insights are generated directly from audio signals to support in-meeting feedback.
(At present, insights are generated without producing participant-accessible transcripts.)
-
Host-controlled visibility
AI feedback is only shown when the host chooses to display it.
Data We Handle
Participant data
- Nickname
- Live meeting audio
- AI-generated insights derived from audio
Host data
- Name
- Email address
Participants do not receive access to raw audio, transcripts, or post-meeting insights.
Data Storage & Security
- Data in transit is protected using industry-standard TLS encryption
- Data is hosted on AWS infrastructure, primarily in the UK
- Access to systems is restricted to authorised personnel only, using role-based access controls
- Customer data is logically isolated - there is no cross-customer access
Your Controls as a Host or Participant
- Hosts decide when AI feedback is visible
- Participants are informed when audio is processed for AI analysis
- Participants do not receive recordings, transcripts, or post-meeting AI insights
- AI feedback is designed for in-session use, not long-term evaluation of individuals
Incident Monitoring & Response
- Monitoring and alerting are in place to detect security issues
- We maintain documented incident response procedures
- Any confirmed data incidents are handled in line with regulatory and contractual obligations
Trusted Technology Partners
We work with a small set of trusted providers, each bound by strict security and privacy obligations:
- Whereby - secure video meetings
- OpenAI - real-time AI feedback generation
- AWS UK - hosting and storage
For full details of how we handle your data, read our complete Privacy Policy.