We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Privacy policy
Automatically convert your audio and video to text using our high-end AI engines.
Let our transcribers perfect your text.
Add subtitles and captions to your videos automatically using our subtitle generator.
Original captions or translated subtitles are created and edited by our subtitlers.
Translated subtitles of unparalleled quality.
Add our Speech-to-text API to your stack and/or request a tailored model.
For filmmakers, production companies, and TV networks.
For universities, e-learning platforms, and schools.
For policy makers, public organizations, and NGOs.
For hospitals and medical research organizations.
For law firms, courts, and compliance teams.
Explore the world of Transcription and Subtitles.
Read how Amberscript helps customers achieve their business goals.
Find the answer on all questions you might have when working with Amberscript.
Get in touch and we will answer your questions.
We make audio accessible.
Last Updated: December 2021
Many of our customers have high priorities on safety and privacy. We work with law enforcement agencies, doctors, lawyers, journalists, and private detectives. That is why we have taken all necessary measures to make sure your data is private and secure.
This vulnerability disclosure policy applies to any vulnerabilities you are considering reporting to us (the “Organisation”). We recommend reading this vulnerability disclosure policy fully before you report a vulnerability and always acting in compliance with it.
We value those who take the time and effort to report security vulnerabilities according to this policy. However, we do not offer monetary rewards for vulnerability disclosures at this point as we are operating on the “neighborhood watch” approach.
If you believe you have found a security vulnerability, please submit your report to us using the form at the end of this page.
In your report please include details of:
These should be a benign, non-destructive, proof of concept. This helps to ensure that the report can be triaged quickly and accurately. It also reduces the likelihood of duplicate reports, or malicious exploitation of some vulnerabilities, such as subdomain takeovers.
After you have submitted your report, we will respond to your report within 5 working days and aim to triage your report within 20 working days. We’ll also aim to keep you informed of our progress.
Priority for remediation is assessed by looking at the impact, severity and exploit complexity. Vulnerability reports might take some time to triage or address. You are welcome to inquire about the status but should avoid doing so more than once every 30 days. This allows our teams to focus on the remediation.
We will notify you when the reported vulnerability is remediated, and you may be invited to confirm that the solution covers the vulnerability adequately.
Once your vulnerability has been resolved, we welcome requests to disclose your report. We’d like to unify guidance to affected users, so please do continue to coordinate public release with us.
You must NOT:
You must:
This policy is designed to be compatible with common vulnerability disclosure good practice. It does not give you permission to act in any manner that is inconsistent with the law, or which might cause the Organisation or partner organisations to be in breach of any legal obligations.