Faster research workflows · 10% .edu discount
Secure, compliant transcription
Court-ready transcripts and exhibits
HIPAA‑ready transcription
Scale capacity and protect margins
Evidence‑ready transcripts
Meetings into searchable notes
Turn sessions into insights
Ready‑to‑publish transcripts
Customer success stories
Integrations, resellers & affiliates
Security & compliance overview
Coverage in 140+ languages
Our story & mission
Meet the people behind GoTranscript
How‑to guides & industry insights
Open roles & culture
High volume projects, API and dataset labeling
Speak with a specialist about pricing and solutions
Schedule a call - we will confirmation within 24 hours
POs, Net 30 terms and .edu discounts
Help with order status, changes, or billing
Find answers and get support, 24/7
Questions about services, billing or security
Explore open roles and apply.
Human-made, publish-ready transcripts
Broadcast- and streaming-ready captions
Fix errors, formatting, and speaker labels
Clear per-minute rates, optional add-ons, and volume discounts for teams.
"GoTranscript is the most affordable human transcription service we found."
By Meg St-Esprit
Trusted by media organizations, universities, and Fortune 50 teams.
Global transcription & translation since 2005.
Based on 3,762 reviews
We're with you from start to finish, whether you're a first-time user or a long-time client.
Call Support
+1 (831) 222-8398Speaker 1: While GDPR is primarily a data privacy law, it also includes elements of data security, and those requirements apply to both controllers and processors. GDPR is not prescriptive when it comes to security requirements for processing personal data. Instead, GDPR requires each organization to evaluate its own security based on risk, processing activities, and organizational structure. And that's because privacy needs evolve and privacy threats evolve, so GDPR is designed to evolve along with those needs and those privacy threats. Some examples of appropriate organizational and technical controls include risk assessments, encryption, pseudonymization, and documented information security policies that cover things like business continuity, physical security, logical access, configuration management, human resources, and management oversight. Now, in addition to those particular controls and documentation around the policies and procedures of those controls, there should also be a process to monitor and test the effectiveness of those controls, and that's where internal and third-party auditing comes into play. There have been some unofficial attempts to map GDPR requirements to ISO 27001 and SOC audits, and those are effective ways of monitoring organizational controls, but for GDPR purposes, they may be incomplete with respect to some of the data privacy elements. Because GDPR is not prescriptive when it comes to the appropriate organizational and technical controls, there will be codes of conduct and certification standards that will provide some level of prescriptiveness when it comes to security of processing. Until those codes come out or if an organization chooses to define its own standards for what is appropriate, things like third-party audits and internal audits will serve as an effective way of demonstrating that thought and objectivity has been considered when it comes to what is appropriate for an organization. In order to determine whether or not a control is appropriate, whether that's an organizational control or a technical control, it's important to know what the goal is for security of processing under GDPR. The goal is to prevent the unauthorized or accidental loss, destruction, use, or disclosure of personal data. For almost any security threat, there is one or more tools or controls. If your budget, time, and resources are unlimited, fortunately GDPR allows organizations to take into consideration the cost, practicality, and reasonableness of a control to mitigate risk and expects organizations to take what is appropriate for the organization, for the risk, and for the processing activity. In addition to considering the processing risk to data subjects, organizations are also allowed to consider the ability and resources of the organization to implement a control. Just because a control is a possible control that would mitigate a risk doesn't mean it's an appropriate control. It might be beyond the scope because it's too expensive or not practical, or it might not be insufficient because it's not secure enough.
Generate a brief summary highlighting the main points of the transcript.
GenerateGenerate a concise and relevant title for the transcript based on the main themes and content discussed.
GenerateIdentify and highlight the key words or phrases most relevant to the content of the transcript.
GenerateExtract key takeaways from the content of the transcript.
GenerateAnalyze the emotional tone of the transcript to determine whether the sentiment is positive, negative, or neutral.
GenerateWe’re Ready to Help
Call or Book a Meeting Now