Can TiQ employees read my meeting transcripts?
+
No. Transcripts exist only in the backend's Node.js process memory for the duration of your session. They are never written to a database, a log, or any storage system TiQ employees have access to. By the time a session ends, there is nothing to read.
Is my conversation used to train AI models?
+
No. TiQ does not store conversation content in any form that could be used for training. For BYOK track users, whether your data is used to train your LLM provider's models is governed by your agreement with that provider (OpenAI, Anthropic). For Managed track users, TiQ uses API access under agreements with providers that include data protection terms — your content is not used for training.
What happens to my data if TiQ is acquired or shuts down?
+
Because conversation content is never stored, there is no conversation data to be acquired, transferred, or lost. The only data that would be subject to business continuity concerns is your account information (email, payment records) — which is standard for any paid service. Your meetings are not at risk.
Can I use TiQ for confidential client meetings?
+
Yes, with appropriate context. TiQ's architecture is designed to minimize data exposure. For highly regulated industries (legal, healthcare, financial services), you should verify whether your organization's policies permit AI-assisted tools that process conversation content, regardless of storage guarantees. The BYOK track gives you direct control over which LLM provider handles your data.
Does TiQ comply with GDPR?
+
TiQ's architecture is designed to minimize personal data processing. Conversation content — which could constitute personal data under GDPR — is processed transiently and never stored. The metadata we retain (session timestamps, persona types, duration) is minimal and necessary for entitlement management. We're in the process of completing a formal Data Protection Impact Assessment and will publish our full GDPR documentation for enterprise users.
How do I know the privacy claims are technically accurate?
+
Healthy skepticism is appropriate. Our security page describes the architectural enforcement mechanisms — including how the central logger throws exceptions on forbidden fields, how BYOK keys are scoped to React state only, and how the conversation buffer is cleared on session teardown. We're planning to make key privacy-critical modules available for independent review as we approach enterprise readiness.