Dictatio
Legal
Sign InGet Started
Trust & Safety

Security & Data Protection

Last updated: January 31, 2026

Security is foundational to our platform. We design our systems to protect customer data while maintaining flexibility, performance, and transparency.

Our Approach to Security

Our security practices are aligned with widely accepted industry standards and are continuously evaluated as our platform evolves.

We primarily serve business and professional users and understand the importance of protecting sensitive, proprietary, and regulated content.

Data Hosting & Infrastructure Security

Customer data is hosted on enterprise-grade cloud infrastructure designed to meet modern security, availability, and durability standards.

Our hosting environment provides:

  • Physically secured data centers
  • Network-level protections and isolation
  • Redundant storage and high availability architecture
  • Continuous monitoring and operational safeguards

We operate under a shared responsibility model, where the infrastructure provider secures the underlying platform and we secure the application, data access, and operational controls.

Data Encryption

  • Data in transit is protected using industry-standard TLS encryption.
  • Data at rest is stored on encrypted systems managed by our infrastructure providers.
  • Encryption practices follow current security best practices appropriate to the sensitivity of stored content.

Access Control & Authentication

We do not manage or store user passwords.

Authentication is handled through trusted third-party identity providers, including:

  • Google
  • Microsoft
  • Apple
  • Facebook

These providers support modern security measures such as multi-factor authentication (MFA), account monitoring, and recovery protections.

We strongly recommend enabling MFA and following identity-provider security guidance to protect account access.

User Responsibility & Shared Security Model

Security is a shared responsibility between our platform and our users.

We are responsible for securing the platform, infrastructure integrations, and application-level safeguards.

Users are responsible for:

  • Managing access to their accounts
  • Ensuring proper authorization for uploaded content
  • Controlling who may view or share their data
  • Complying with applicable laws, regulations, and internal policies

We do not verify business accuracy, legal compliance, or regulatory suitability of uploaded content beyond our platform restrictions.

Content Monitoring & Acceptable Use

As a hosting provider for user-generated video content, we maintain safeguards to protect our platform and customers.

We reserve the right to audit, restrict, remove, or disable access to content that violates our policies, including but not limited to:

  • Pornographic or sexually explicit material
  • Content involving minors
  • Hate speech, violence, or extremist content
  • Intellectual property infringement
  • Illegal, abusive, or exploitative material
  • Content uploaded without proper authorization or consent

Content may be removed without prior notice if it poses legal, security, reputational, or operational risk.

Proprietary Safeguards & Platform Controls

We implement proprietary safeguards designed to:

  • Enforce platform usage restrictions
  • Detect misuse, abuse, or anomalous behavior
  • Protect system availability and integrity
  • Support security expectations of business customers

Details of these controls are not publicly disclosed to prevent circumvention.

Data Retention & Deletion

We retain customer data only as necessary to provide our services or meet legal, operational, or contractual requirements.

Users may request deletion of their data, subject to:

  • Active account status
  • Legal retention obligations
  • Backup and recovery processes

Deleted data is removed from active systems and phased out of backups according to standard retention cycles.

Business & Enterprise Considerations

Our security posture is designed to support business and enterprise use cases, including:

  • Secure identity-based access
  • Controlled content sharing
  • Scalable infrastructure for high-volume workloads
  • Alignment with common IT and procurement expectations

We are available to engage with customer security or compliance teams as part of due-diligence processes.

Security Assurance & Risk Management

We design our platform using industry-standard security practices, defense-in-depth controls, and continuous monitoring to reduce risk and protect customer data.

While no technology environment can be guaranteed to be entirely free from risk, we take a proactive approach to identifying, mitigating, and responding to security threats.

Our focus is on prevention, detection, and response, supported by secure infrastructure, controlled access, and operational safeguards appropriate for business use cases.

Updates to This Policy

We may update this Security & Data Protection page to reflect changes in technology, regulations, or our platform. Updates will be posted on this page.

Contact

For security-related questions or concerns, please contact us at [email protected].

© 2026 Dictatio. All rights reserved.

PrivacyTermsSecurityHome