Privacy and Security


At Jenson8, we believe AI should make meetings more effective, not more invasive. Our AI meeting facilitator is designed to support better conversations while respecting participant trust, privacy, and control.

We are transparent about how the system works today, and we are continuously improving our privacy and security controls as the product matures.


Our guiding principles

Transparency

Participants are informed when AI support is active and what it is used for.

Control

The meeting host controls when (and whether) AI feedback is shared with participants.

Privacy by Design

We aim to collect only what is necessary to provide the service and to limit how long data is retained.


How It Works

  1. Join the meeting

    Participants join via a secure web page with embedded video conferencing. Only a nickname is required for participants.

  2. Audio processing

    Meeting audio is streamed securely to support real-time analysis.

  3. AI-generated insights

    Insights are generated directly from audio signals to support in-meeting feedback.

    (At present, insights are generated without producing participant-accessible transcripts.)

  4. Host-controlled visibility

    AI feedback is only shown when the host chooses to display it.


Data We Handle

Participant data

  • Nickname
  • Live meeting audio
  • AI-generated insights derived from audio

Host data

  • Name
  • Email address

Participants do not receive access to raw audio, transcripts, or post-meeting insights.


Data Storage & Security

  • Data in transit is protected using industry-standard TLS encryption
  • Data is hosted on AWS infrastructure, primarily in the UK
  • Access to systems is restricted to authorised personnel only, using role-based access controls
  • Customer data is logically isolated - there is no cross-customer access

Your Controls as a Host or Participant

  • Hosts decide when AI feedback is visible
  • Participants are informed when audio is processed for AI analysis
  • Participants do not receive recordings, transcripts, or post-meeting AI insights
  • AI feedback is designed for in-session use, not long-term evaluation of individuals

Incident Monitoring & Response

  • Monitoring and alerting are in place to detect security issues
  • We maintain documented incident response procedures
  • Any confirmed data incidents are handled in line with regulatory and contractual obligations

Trusted Technology Partners

We work with a small set of trusted providers, each bound by strict security and privacy obligations:

  • Whereby - secure video meetings
  • OpenAI - real-time AI feedback generation
  • AWS UK - hosting and storage

For full details of how we handle your data, read our complete Privacy Policy.

Still need help? Contact Us Contact Us