Omi AI logo
Live monitoring by Delve
Omi AI Compliance Report
Omi AI is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Ctrl+K

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IIIn Observation

SOC 2 Type II

Audited controls for security, availability, and confidentiality trust service principles with an observation period.

In the observation period
SOC 2 Type ICompliant

SOC 2 Type I

Audited controls for security, availability, and confidentiality trust service principles.

HIPAACompliant

HIPAA

US regulation that safeguards medical data privacy and security. Essential for healthcare providers, insurers, and related tech.

Continuously monitored

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

SOC 2 Type I

Compliance report

PDF

HIPAA Internal Privacy Policy

HIPAA Internal Privacy Policy document

Updated: January 2026
PDF

Personnel Security Policy

Personnel Security Policy document

Updated: January 2026
PDF

Acceptable Use Policy

Acceptable Use Policy document

Updated: January 2026
PDF

Information Security Policy

Information Security Policy document

Updated: January 2026
PDF

Access Control and Termination Policy

Access Control and Termination Policy document

Updated: January 2026

Security Controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed

Compliance with Regulations & Standards

LIVE
Breach Notification Communication
Completed
e​Phi Policy Accessibility Evidence
Completed
Information Security Policies and Procedures
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Asset Disposal Procedure
Completed

Governance

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed

Other

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed

Compliance with Regulations & Standards

LIVE
Breach Notification Communication
Completed
e​Phi Policy Accessibility Evidence
Completed
Information Security Policies and Procedures
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Governance

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed
Employee Annual Performance Reports
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Other

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed

Compliance with Regulations & Standards

LIVE
Breach Notification Communication
Completed
e​Phi Policy Accessibility Evidence
Completed
Information Security Policies and Procedures
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Governance

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed
Employee Annual Performance Reports
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Other

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed
Showing 6 of 8 control categories

Subprocessors Directory

We carefully select and monitor all third-party services that process data on our behalf.

OpenAI logo

OpenAI

AI & ML Services

GitHub logo

GitHub

Code & Build Security

Mixpanel logo

Mixpanel

Business Apps & Productivity

Google Cloud Platform logo

Google Cloud Platform

Cloud Infrastructure & Platform Services

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Omi, security isn’t just a feature—it’s foundational to everything we build. Our security-first mindset shapes how we design our hardware, develop our software, and operate our infrastructure and internal systems. We treat the audio, conversations, and personal context entrusted to us—by our users, partners, and anyone interacting with the Omi ecosystem—with the highest level of care and responsibility. Security is embedded into our DNA, allowing us to build powerful, always-on AI experiences without ever compromising trust or protection.

Privacy Policy|Terms of Service
Monitored byDelve Logo
Security Shield
Advertisement