Security & compliance

The security of your meetings is not an option — it's at the very heart of how Geremy is built

Your conversations contain your organisation's most sensitive information. Geremy was built on the Privacy by Design principle: sovereign hosting, end-to-end encryption, processing without human access, audio deleted after use, and no AI training on your data.

Three certifications, the highest level of requirements

Our hosting infrastructure holds the three most demanding certifications on the market. Your data never leaves this audited environment — Geremy has no access to your audio and no human access to your write-ups.

Our concrete commitments

What happens to your audio recording?

Voice is a sensitive biometric data under the GDPR: we do not retain it a single second longer than necessary. Here is its complete lifecycle.

  1. 1
    Recording

    Audio is encrypted (AES-256) at the point of capture, on your device.

  2. 2
    Transfer

    Sent to our European servers over a secure channel (TLS 1.3).

  3. 3
    Processing

    Transcription and report generation are fully automated, with no human access whatsoever.

  4. 4
    Deletion

    Audio is immediately and permanently destroyed once processing is complete. Not archived «just in case».

What stays on our servers is only your meeting minutes — the text you view, edit, export, and delete whenever you choose.

GDPR: who does what

Geremy (Stellar Quantum SAS) acts as a data processor under the GDPR: we process audio data on your behalf, in accordance with your instructions. You are the data controller: you decide to record a meeting, you choose the participants involved, and you determine the purpose. As such, it is your responsibility to inform participants that the meeting is being recorded and to obtain their consent where required (this is a legal obligation in most European countries, whether in person or via video conference).

Questions about security or compliance?

For organisations subject to enhanced requirements (healthcare, finance, public sector), we provide the DPA and Security White Paper on request, and respond to your security questionnaires.