Product

Solutions

Resources

Product

Solutions

Resources

AWARD-WINNING ACCURACY AND SECURITY

AWARD-WINNING ACCURACY AND SECURITY

Our security commitment

Our security commitment

At Fellow, we pride ourselves in helping teams run productive meetings while prioritizing privacy and security. 
We’re committed to ensuring that your notes and action items are safe and secure. 

At Fellow, we pride ourselves in helping teams run productive meetings while prioritizing privacy and security. 
We’re committed to ensuring that your notes and action items are safe and secure. 

SOC2 compliance badge
SOC2 compliance badge
SOC2 compliance badge
GDPR badge
GDPR badge

Enterprise security

Enterprise security

Certified compliance

Certified compliance

Fellow takes your privacy and security seriously. Your meeting data is never shared with AI models and you control who can access your meeting records and notes. You also maintain full administrative control over who has access to recordings and which meetings Fellow Copilot attends. 

Fellow takes your privacy and security seriously. Your meeting data is never shared with AI models and you control who can access your meeting records and notes. You also maintain full administrative control over who has access to recordings and which meetings Fellow Copilot attends. 

GDPR compliant

GDPR compliant

SOC 2 Type II Compliance

SOC 2 Type II Compliance

AES 256-bit encryption

AES 256-bit encryption

Intrusion detection systems

Intrusion detection systems

Any data sent to an AI vendor is immediately deleted within the LLM. We have provisions in place with all AI vendors to ensure their models are not trained using Fellow customer data.

Any data sent to an AI vendor is immediately deleted within the LLM. We have provisions in place with all AI vendors to ensure their models are not trained using Fellow customer data.

Network Security and Vulnerability Management

ellow hosts its server infrastructure on Amazon Web-Services (AWS) which has a robust security infrastructure. Communication between services is encrypted – between our app and end users’ browser (HTTPS), and data at rest is encrypted using AES 256-bit encryption.

Fellow also maintains the following vulnerability management systems:
· Endpoint Monitoring
· Ongoing vulnerability scans
· Static code scans
· Third party penetration testing

Network Security and Vulnerability Management

ellow hosts its server infrastructure on Amazon Web-Services (AWS) which has a robust security infrastructure. Communication between services is encrypted – between our app and end users’ browser (HTTPS), and data at rest is encrypted using AES 256-bit encryption.

Fellow also maintains the following vulnerability management systems:
· Endpoint Monitoring
· Ongoing vulnerability scans
· Static code scans
· Third party penetration testing

Network Security and Vulnerability Management

ellow hosts its server infrastructure on Amazon Web-Services (AWS) which has a robust security infrastructure. Communication between services is encrypted – between our app and end users’ browser (HTTPS), and data at rest is encrypted using AES 256-bit encryption.

Fellow also maintains the following vulnerability management systems:
· Endpoint Monitoring
· Ongoing vulnerability scans
· Static code scans
· Third party penetration testing

Data Privacy

Meeting notes and action items are only accessible by people who were invited to that specific meeting, or if someone with access grants them permission. Which means that only the relevant people will be able to view/edit meeting notes

In terms of overall data privacy – first and foremost, the customer owns their data! Any info entered into Fellow (including notes and feedback) will not be used for any other purpose but to provide our services. Fellow allows for the designation of various roles on your workspace including admin, manager and individual-contributor to ensure that important info is seen only by the appropriate people.

Data Privacy

Meeting notes and action items are only accessible by people who were invited to that specific meeting, or if someone with access grants them permission. Which means that only the relevant people will be able to view/edit meeting notes

In terms of overall data privacy – first and foremost, the customer owns their data! Any info entered into Fellow (including notes and feedback) will not be used for any other purpose but to provide our services. Fellow allows for the designation of various roles on your workspace including admin, manager and individual-contributor to ensure that important info is seen only by the appropriate people.

Data Privacy

Meeting notes and action items are only accessible by people who were invited to that specific meeting, or if someone with access grants them permission. Which means that only the relevant people will be able to view/edit meeting notes

In terms of overall data privacy – first and foremost, the customer owns their data! Any info entered into Fellow (including notes and feedback) will not be used for any other purpose but to provide our services. Fellow allows for the designation of various roles on your workspace including admin, manager and individual-contributor to ensure that important info is seen only by the appropriate people.

Access, Identity, and People Security

Fellow employs internal security controls to ensure that only people who need access to critical services have that access. This access is rigorously tracked, reviewed, and controlled tightly using Role-based Access Controls (RBAC)

Team members at Fellow have undergone both criminal background checks, reference checks, and have signed nondisclosure agreements to ensure confidentiality at all information collected on our systems.  

Access, Identity, and People Security

Fellow employs internal security controls to ensure that only people who need access to critical services have that access. This access is rigorously tracked, reviewed, and controlled tightly using Role-based Access Controls (RBAC)

Team members at Fellow have undergone both criminal background checks, reference checks, and have signed nondisclosure agreements to ensure confidentiality at all information collected on our systems.  

Access, Identity, and People Security

Fellow employs internal security controls to ensure that only people who need access to critical services have that access. This access is rigorously tracked, reviewed, and controlled tightly using Role-based Access Controls (RBAC)

Team members at Fellow have undergone both criminal background checks, reference checks, and have signed nondisclosure agreements to ensure confidentiality at all information collected on our systems.  

Questions?

We place a high value on security and privacy! If you would like to learn more details about our security and compliance measures, we have some additional resources available.

✔︎ Privacy Policy
✔︎ Terms of Use
✔︎ Security & Compliance

If you have any questions or concerns, please contact support@fellow.co or your account manager.

Questions?

We place a high value on security and privacy! If you would like to learn more details about our security and compliance measures, we have some additional resources available.

✔︎ Privacy Policy
✔︎ Terms of Use
✔︎ Security & Compliance

If you have any questions or concerns, please contact support@fellow.co or your account manager.

Questions?

We place a high value on security and privacy! If you would like to learn more details about our security and compliance measures, we have some additional resources available.

✔︎ Privacy Policy
✔︎ Terms of Use
✔︎ Security & Compliance

If you have any questions or concerns, please contact support@fellow.co or your account manager.

WINTER

Leader

Small business

2024

2024

WINTER

Mid-market

Leader

2024

WINTER

Leader

Enterprise

Leader

WINTER

2024

WINTER

2024

Mid-Market

Best
Relationship

2024

Best
Relationship

Small Business

WINTER

2024

Most
Implementable

Small Business

WINTER

WINTER

Leader

Small business

2024

2024

WINTER

Mid-market

Leader

2024

WINTER

Leader

Enterprise

Leader

WINTER

2024

WINTER

2024

Mid-Market

Best
Relationship

2024

Best
Relationship

Small Business

WINTER

2024

Most
Implementable

Small Business

WINTER

WINTER

Leader

Small business

2024

2024

WINTER

Mid-market

Leader

2024

WINTER

Leader

Enterprise

Leader

WINTER

2024

WINTER

2024

Mid-Market

Best
Relationship

2024

Best
Relationship

Small Business

WINTER

2024

Most
Implementable

Small Business

WINTER

Features for every team

Sales

IT

Marketing

Engineering

Operations

Customer Success

"Fellow brings the barrier to having great meetings down by having built in reminders and extensions, making it really easy to drive effective meetings"

Sarah Mercedes, USA Corp at HubSpot

Add structure to one-on-ones

Run more efficient meetings

Increase accountability

Fellow integrates with your existing tools for seamless workflow

Fellow integrates with your existing tools for seamless workflow

Fellow integrates with your existing tools for seamless workflow


The #1 AI Meeting Assistant

Fellow is the only AI meeting assistant and note taker built for internal and external meetings. Get the most accurate and secure meeting transcription, recording and summaries.