
We are dedicated to keeping your calls confidential and your company’s data secure. If you’re signing up for an Enterprise plan, we’d be happy to do a security assessment.

Bridge leverages the information security controls and infrastructure of Mezmo Corporation (dba InnoCaption), which maintains a security program aligned with the SOC 2 Trust Services Criteria for security, availability, and confidentiality and undergoes independent third-party assessments. Bridge benefits from these controls, and applicable documentation may be provided during enterprise security reviews subject to confidentiality obligations.


Bridge leverages the information security controls and infrastructure of Mezmo Corporation (dba InnoCaption), which maintains a security program aligned with the SOC 2 Trust Services Criteria for security, availability, and confidentiality and undergoes independent third-party assessments. Bridge benefits from these controls, and applicable documentation may be provided during enterprise security reviews subject to confidentiality obligations.

Although Bridge Caption does not store electronic protected health information (ePHI), we ensure that administrative, technical, and physical safeguards designed to comply with the HIPAA Security Rule are applied to Bridge Caption and the systems that support it. These safeguards are intended to protect sensitive information and support use in healthcare and health-related environments.


Although Bridge Caption does not store electronic protected health information (ePHI), we ensure that administrative, technical, and physical safeguards designed to comply with the HIPAA Security Rule are applied to Bridge Caption and the systems that support it. These safeguards are intended to protect sensitive information and support use in healthcare and health-related environments.
For customers that are HIPAA-covered entities, we will enter into a Business Associate Agreement (BAA) as appropriate.
Our team participates in ongoing security and HIPAA training to reinforce and uphold privacy and security best practices.
We maintain a culture of privacy and security for Bridge, embedding data protection principles into product design, operational processes, and day-to-day decision-making.
Bridge uses technical measures such as access controls, encryption, and monitoring to help protect data from unauthorized access or disclosure.
No call transcripts or audio data are stored or retained for any purpose.
All data is encrypted using industry-standard encryption protocols.
Access to sensitive data and critical systems is strictly controlled.
Our systems and processes will be regularly audited to identify and mitigate potential vulnerabilities.
We have a robust plan in place to quickly address and mitigate the effects of security incidents.
No call transcripts or audio data are stored or retained for any purpose.
