Trust Center

At Agni, security isn’t an afterthought — it’s the foundation. We’ve built our voice AI platform from the ground up with enterprise-grade security, privacy, and compliance controls so you can deploy with confidence.

SOC 2 Type II

Independently audited controls for security, availability, and confidentiality.

GDPR Ready

Full compliance with EU data protection regulations.

HIPAA Compliant

Safeguards for protected health information (PHI).

Compliance & Certifications

SOC 2 Type II

Agni has completed a SOC 2 Type II audit conducted by an independent third-party auditor. This certification validates that our systems and processes meet rigorous standards across all five Trust Service Criteria:
Systems are protected against unauthorized access through multi-layered security controls including encryption at rest and in transit, network segmentation, intrusion detection, and role-based access control.
Infrastructure is designed for high availability with redundant systems, automated failover, real-time monitoring, and defined SLAs. Our platform maintains 99.9%+ uptime.
Sensitive data is classified, encrypted, and access-restricted. We enforce strict data handling policies and conduct regular access reviews.
System processing is complete, valid, accurate, and timely. We maintain audit trails for all data operations and API transactions.
Personal data is collected, used, retained, and disclosed in conformity with our privacy commitments and applicable regulations.
To request a copy of our latest SOC 2 Type II report, please contact support@ravan.ai.

GDPR Ready

Agni is built with GDPR readiness in mind for organizations operating in or serving users in the European Union. Our platform provides the tools and controls needed to support your GDPR compliance obligations.

Data Processing Agreement

We provide a DPA that details our role as a data processor, lawful basis for processing, data retention policies, and sub-processor disclosures.

Data Subject Rights

We support all GDPR data subject rights including access, rectification, erasure, portability, and the right to restrict processing.

Data Residency

Data is processed and stored in AWS regions within the EU or US based on your configuration. You choose where your data lives.

Breach Notification

In the event of a data breach, we notify affected customers within 72 hours as required by GDPR, with full incident details and remediation steps.

HIPAA Compliance

For healthcare organizations and businesses handling Protected Health Information (PHI), Agni provides the safeguards required under the Health Insurance Portability and Accountability Act (HIPAA).
  • Business Associate Agreement (BAA) — We execute BAAs with all customers who require HIPAA compliance
  • PHI Encryption — All protected health information is encrypted at rest (AES-256) and in transit (TLS 1.2+)
  • Access Controls — Role-based access with audit logging for all PHI access events
  • Minimum Necessary Standard — Our systems are designed to access only the minimum data required for processing
  • Audit Trail — Complete audit logs of all data access, modifications, and API calls involving PHI
HIPAA compliance features are available on enterprise plans. Contact support@ravan.ai to enable HIPAA-compliant configurations for your organization.

Infrastructure Security

Hosted on AWS

Agni runs entirely on Amazon Web Services (AWS), leveraging world-class infrastructure with built-in security controls.

AWS Regions

Deployed across multiple AWS regions (US and EU) with automatic failover and geo-redundancy.

Network Security

VPC isolation, private subnets, security groups, and AWS WAF protect all network traffic.

Compute Security

Hardened container images, automated patching, and immutable infrastructure deployments.

Monitoring

24/7 monitoring with AWS CloudWatch, GuardDuty threat detection, and automated incident response.

Encryption

LayerStandardDetails
Data at restAES-256All databases, file storage, and backups encrypted with AWS KMS managed keys
Data in transitTLS 1.2+All API calls, WebSocket connections, and voice streams encrypted end-to-end
Voice dataAES-256Call recordings and transcripts encrypted with per-customer keys
API keysSHA-256Hashed and salted — we never store API keys in plain text

Network Architecture

  • DDoS Protection — AWS Shield Standard on all endpoints, Shield Advanced available
  • Web Application Firewall — AWS WAF with custom rules blocking injection, XSS, and bot attacks
  • Private Networking — All internal services communicate over private VPC links, never over the public internet
  • Rate Limiting — API rate limiting at the edge to prevent abuse and ensure fair usage

Data Privacy & Handling

Data Retention

Data TypeRetentionNotes
Call recordings90 days defaultConfigurable per organization. Can be set to 0 (no recording)
Call transcripts90 days defaultConfigurable. Supports automatic deletion policies
Analytics data12 monthsAggregated metrics retained for reporting
API logs30 daysRequest/response logs for debugging and audit
Account dataUntil deletionRetained while account is active. Deleted within 30 days of account closure

Data Deletion

  • Self-service — Delete call recordings, transcripts, and contacts via the dashboard or API
  • Account deletion — Full data purge within 30 days of account closure
  • Right to erasure — GDPR Article 17 requests processed within 72 hours
  • Automated cleanup — Expired data is automatically purged per your retention settings

Sub-Processors

We use a limited number of trusted sub-processors, each bound by strict data processing agreements:
ProviderPurposeLocation
Amazon Web Services (AWS)Cloud infrastructure, compute, storageUS / EU
TwilioTelephony, phone numbers, SMSUS
OpenAILLM processing (configurable)US
StripeBilling and payment processingUS
We maintain a current list of sub-processors. Customers are notified of any sub-processor changes with 30 days advance notice.

Application Security

Secure Development

  • Secure SDLC — Security is integrated into every phase of development: design review, code review, static analysis, and penetration testing
  • Dependency Scanning — Automated scanning of all dependencies for known vulnerabilities (CVEs)
  • Code Review — All code changes require peer review before merge
  • CI/CD Security — Build pipelines include security checks, linting, and automated tests

Authentication & Access Control

  • API Key Authentication — Unique per-organization API keys with SHA-256 hashing
  • Role-Based Access Control (RBAC) — Granular permissions for team members (Owner, Admin, Member)
  • Two-Factor Authentication (2FA) — Available for all user accounts
  • Session Management — Configurable session timeouts and active session monitoring
  • SSO — Google OAuth supported, with SAML/OIDC available on enterprise plans

Vulnerability Management

  • Penetration Testing — Annual third-party penetration tests with remediation tracking
  • Bug Bounty — Responsible disclosure program for security researchers
  • Incident Response — Documented incident response plan with defined escalation procedures
  • Patching — Critical vulnerabilities patched within 24 hours; high-severity within 7 days

Responsible AI

Voice AI Ethics

Agni is committed to the responsible development and deployment of voice AI technology:
  • Transparency — All AI-powered calls clearly identify themselves as AI agents when required by law
  • Consent — Call recording and monitoring comply with local consent laws (one-party and two-party)
  • Bias Mitigation — Regular audits of AI model outputs for fairness across demographics
  • Human Oversight — Call transfer to human agents is always available as a fallback
  • Data Minimization — We collect only the data necessary to provide the service

Frequently Asked Questions

Yes. Contact support@ravan.ai with your organization details, and we’ll share the latest report under NDA.
Yes. We execute Business Associate Agreements for healthcare customers on enterprise plans. Reach out to support@ravan.ai to get started.
All data is stored on AWS infrastructure. By default, data is stored in US regions. EU data residency is available upon request.
You can delete call recordings, transcripts, and contacts from the dashboard or via the API. For full account deletion, contact support and all data will be purged within 30 days.
We never sell customer data. Data is shared only with sub-processors listed above, strictly for providing the service. All sub-processors are bound by DPAs.
Our incident response team is available 24/7. Affected customers are notified within 72 hours with full incident details, impact assessment, and remediation steps.

Questions about security?

Reach out to our security team at support@ravan.ai. We’re happy to discuss your compliance requirements, share audit reports, or schedule a security review.