security

Protecting your
data and privacy

We are dedicated to keeping your calls confidential and your company’s data secure. If you’re signing up for an Enterprise plan, we’d be happy to do a security assessment.

FCC certified

Bridge is powered by InnoCaption, a certified IP Captioned Telephone Service (IP CTS) provider regulated by the Federal Communications Commission (FCC). We adhere to stringent security protocols to ensure the integrity and confidentiality of all communications.

FCC certified

Bridge is powered by InnoCaption, a certified IP Captioned Telephone Service (IP CTS) provider regulated by the Federal Communications Commission (FCC). We adhere to stringent security protocols to ensure the integrity and confidentiality of all communications.

SOC 2 compliant

To validate the policies and protocols we use to protect customer data, Bridge has undergone a third-party SOC 2 audit assessing our information security practices against key criteria like security, availability, and confidentiality. The compliance report can be made available during security assessments.

SOC 2 compliant

To validate the policies and protocols we use to protect customer data, Bridge has undergone a third-party SOC 2 audit assessing our information security practices against key criteria like security, availability, and confidentiality. The compliance report can be made available during security assessments.

HIPAA compliant

Although we do not store electronic Protected Health Information (ePHI), we are committed to HIPAA compliance to ensure the protection of health information and provide peace of mind to individuals in health-related fields. We apply HIPAA standards, which include:



HIPAA compliant

Although we do not store electronic Protected Health Information (ePHI), we are committed to HIPAA compliance to ensure the protection of health information and provide peace of mind to individuals in health-related fields. We apply HIPAA standards, which include:



Robust security measures

Our security protocols are designed to protect all user data as if it were ePHI.



Regular security training

Our staff undergoes ongoing training in privacy and security best practices to uphold our commitment to data protection.

Culture of privacy

We prioritize privacy and security in all our operations, ensuring a secure environment for all users, particularly those from health-related fields.


Security protocols

Call privacy

No call transcripts or audio data are stored or retained for any purpose.

Data encryption

All data is encrypted using industry-standard encryption protocols.

Access controls

Access to sensitive data and critical systems is strictly controlled. 

Call privacy

Our systems and processes will be regularly audited to identify and mitigate potential vulnerabilities.

Incident response

We have a robust plan in place to quickly address and mitigate the effects of security incidents.

Call privacy

No call transcripts or audio data are stored or retained for any purpose.