Call recording presents special technical challenges. Call recordings may be intentionally or unintentionally deleted or permanently lost due to the failure of data storage systems or other equipment. Snapcom provides call recording capabilities on a best effort basis only, and does not make any warranty concerning the reliability, availability, or audibility of any call recording made on the Snapcom hosted PBX system. Call recording may present special legal requirements, and you acknowledge that it is your responsibility to research and comply with any Federal, State, or local laws governing the creation or usage of call recordings, call monitoring, or any other feature that may require legal or regulatory compliance. Some states require that all parties in a recorded telephone conversation are notified of the recording, and it is your responsibility to ensure that appropriate audio announcements are used whenever required to ensure legal compliance.
Third party Cloud Storage Compliance Overview (Including but not limited to Call Recording and Voicemail)
Our platform adheres to a broad range of compliance frameworks, including:
HIPAA: Ensures the protection of electronic protected health information (ePHI) in accordance with the Health Insurance Portability and Accountability Act and the Health Information Technology for Economic and Clinical Health Act (HITECH).
CJIS: Complies with the Criminal Justice Information Services standards for the secure storage of Criminal Justice Information.
FERPA: Supports educational institutions in meeting the Family Educational Rights and Privacy Act requirements for safeguarding student records.
GDPR & UK GDPR: Aligns with the General Data Protection Regulation standards for data privacy and protection in the European Union and the United Kingdom.
TPN: Certified by the Trusted Partner Network, ensuring secure handling of media and entertainment content.
SEC: Complies with the U.S. Securities and Exchange Commission regulations, including Rule 17a-4 for electronic recordkeeping.
FedRAMP: Achieved FedRAMP Ready status, indicating adherence to federal security standards for cloud services.
Security and Data Protection
Our service employs a multi-layered security approach to protect data:
Data Encryption: All data is encrypted both in transit and at rest using AES 256-bit encryption.
Access Controls: Implements Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Identity and Access Management (IAM) policies to restrict unauthorized access.
Physical Security: Data centers are SOC 2, ISO 27001, and PCI-DSS certified, featuring 24/7 security personnel, biometric access controls, and surveillance systems.Physical Security: Data centers are SOC 2, ISO 27001, and PCI-DSS certified, featuring 24/7 security personnel, biometric access controls, and surveillance systems.
Third Party Transcription Sentiment Analysys/Call Summary, AI (Including but not limited to Call Recording and Voicemail)
We are committed to maintaining a strong culture of information security and data privacy, recognizing that protecting company and client information is a shared responsibility across the entire organization.
Physical Security Standards
Robust physical data security and environmental controls are enforced. All environments where data may be transmitted or stored are assessed and tested to ensure they meet high security standards.
Data Encryption
Sensitive or confidential information, including PHI and PCI data, is encrypted during storage and transmission across electronic communication networks. Encryption ensures that data remains unreadable and unusable to unauthorized individuals.
Data Privacy
Only information explicitly provided by customers is collected and processed. Customers retain ownership of their data. A publicly accessible privacy policy outlines the types of information collected, how it is used, and information management practices.
Data Security
Data is protected through the use of hardened systems, secure environments, role-based access controls, two-factor authentication, and strong encryption algorithms. All system access is tightly managed to prevent unauthorized entry.
Application Security
Application servers are protected by industry-standard firewalls and restricted port access. Passwords are encrypted in transit and stored using secure hashing methods. Code is scanned for vulnerabilities before each production deployment, and patch management practices are enforced.
Snapcom is not liable for any costs, expenses, losses, or damages, either general, special, actual, consequential, or incidental, that you may suffer or that some other person may suffer and claim against you resulting from the following: use, misuse, or service outage; customer premise hardware; your actions or activities, whether legal or illegal; the actions or activities of any other Snapcom customer, whether legal or illegal; or any other goods or services provided by Snapcom or any of its vendors. In no event shall Snapcom be liable to you under this Agreement or in relation to any matters in any way connected with this Agreement in an amount that exceeds the service fees you have paid in the preceding year. The technical support that Snapcom provides is limited to the connectivity itself and assistance with configuring your phones to work with our services. Support for other applications and uses is not provided or implied.
This policy outlines the coverage provided by the equipment warranty offered by Snapcom. Please note that this policy applies only to select equipment purchased or leased directly through Snapcom and does not extend to equipment obtained from third-party sources.
Manufacturer Defects: We will repair or replace equipment that exhibits defects in materials or workmanship that occur during the warranty period.
Environmental Hazards: Damage resulting from exposure to extreme temperatures, humidity, moisture, or other environmental factors beyond normal operating conditions is not covered.
To us via email sent to customerservice@Snapcom.com.
12444 Powerscourt Dr Suite 270, Saint Louis, MO 63131