Your voice data,
protected by design
Encryption in transit and at rest, BYOC credential isolation, no training on customer data, and compliance certifications aligned with the regulations that matter for voice.
Core security principles
The five guarantees we make on every plan.
Encryption in transit and at rest
All API traffic and SIP signalling use TLS 1.2 or higher. SRTP secures the media path. Recordings, transcripts, and credentials are encrypted at rest with AES-256.
BYOC credential isolation
Bring your own OpenAI, Twilio, and Stripe credentials. Each tenant's keys are encrypted with a dedicated key separate from Laravel's app key, scoped per account, and decrypted only at request time.
No training on customer data
Your call audio, transcripts, and knowledge-base content are never used to train Kalem's models or any third-party model. The OpenAI Realtime API is configured with zero data retention for opted-in enterprise tenants.
Tenant isolation
Every resource — agents, calls, numbers, knowledge bases, vector collections — is scoped to an account. Vector embeddings live in dedicated per-account collections. Cross-tenant queries are blocked at the application layer.
Configurable retention
You decide how long call recordings, transcripts, and logs are kept. Set per-account retention windows or trigger immediate deletion via API. GDPR right-to-erasure requests are honoured within statutory timelines.
Independent verification
Annual third-party penetration tests, SOC 2 Type II audited controls, and continuous monitoring. Findings are remediated on a fixed SLA and re-tested.
Compliance certifications
Frameworks and agreements available across our plans.
GDPR
Full compliance with EU General Data Protection Regulation. Data residency options, right to erasure, and DPA available.
SOC 2 Type II
Audited controls for security, availability, and confidentiality. Regular third-party audits ensure continuous compliance.
End-to-End Encryption
TLS/SSL encryption in transit and AES-256 encryption at rest. Voice data, transcripts, and credentials are always encrypted.
HIPAA
EnterpriseHIPAA-compliant configurations for healthcare. Business Associate Agreements (BAA) available for Enterprise customers.
PCI DSS
EnterprisePayment Card Industry compliance for handling sensitive payment data during voice interactions securely.
Custom SLA
EnterpriseCustom Service Level Agreements with guaranteed uptime, response times, and dedicated incident management.
Custom DPA
EnterpriseCustom Data Processing Agreements tailored to your organization's data governance requirements.
How data flows through Kalem
A typical voice call, traced from caller to AI and back.
-
1
Inbound call
A SIP or PSTN call hits your telephony provider (Twilio, your own carrier, or our SIP gateway). Signalling is TLS-protected; media is SRTP-encrypted.
-
2
Tenant resolution
Kalem authenticates the inbound number, resolves the agent and account, and decrypts your BYOC OpenAI key in memory using the per-tenant encryption key.
-
3
Realtime conversation
Audio is streamed directly to OpenAI's Realtime API over a TLS WebSocket. Knowledge-base lookups query a per-account vector collection. Tool calls hit your webhook URLs over HTTPS.
-
4
Storage
Recordings (if enabled) and transcripts are written to encrypted storage with AES-256. Retention follows your configured policy. Billing metadata is separated from call content.
-
5
Access
Dashboard access uses Sanctum-issued tokens. API tokens are scoped per integration and revocable. Every administrative action is logged via the activity-log audit trail.
Subprocessors
Third-party services that may process customer data, with their role.
| Vendor | Purpose | Data |
|---|---|---|
| OpenAI | Realtime speech-to-speech model | Call audio, transcripts (BYOC: your own API key) |
| Twilio | Telephony and SMS/WhatsApp | Phone numbers, call signalling, message metadata |
| Stripe | Subscription billing and card payments | Billing email, payment tokens (no PAN stored by Kalem) |
| AWS | Hosting, encrypted storage, queues | Application data, encrypted recordings/transcripts |
| Qdrant | Vector search for knowledge bases | Document embeddings (per-account collection) |
Enterprise customers receive an up-to-date subprocessor list as part of their DPA, with 30-day advance notice of changes.
Report a vulnerability
If you believe you've found a security issue, please email security@kalem.me. We acknowledge reports within one business day and will keep you posted through resolution. Please do not publicly disclose the issue until we've had a chance to fix it.