🔒
Conserver.io
  • 👋Welcome to the Home of the vCons
  • vCons
    • 💬A vCon Primer
    • 🌎vCons are...
    • 🧠Why vCons?
    • 💡Concepts
    • ✨More Information
  • vCon Library
    • 🐰Quickstart
    • Library API
    • Cheat Sheet
    • GitHub Repo
  • Conserver
    • 🚀Conserver Introduction
    • 🐰Conserver Quick Start
    • Configuring the Conserver
    • 🏫Concepts
    • ❤️Inside the Conserver
    • 🔗Standard Links
    • 🗄️Storage
    • 📆Day In the Life of a vCon
    • 🧩API
    • 🔌Integrating Your App
    • GitHub Repo
  • Tools
    • vCon Faker
    • vCon Admin
    • Mongo Redis Sync
  • vCon Apps and Stores
    • TADHack vCon
    • vCon Stores and Apps
    • vCon App Template
  • Deep Dives
    • GitHub Repo
    • vCon IETF Working Group
  • HELPS and HACKS
    • Coding Prompt Cheat Sheet
    • Fake vCons
  • Use Cases / Studies
    • Overview
    • Service Provider Migration
    • Speech Recognition Test Set
    • AI Integration
    • PII Compliance
    • Customer Experience Improvement
    • Sharing Conversations with Third Parties
    • Verbal Agreements - Converted to Writing
    • Authenticating and Certifying Conversations
    • Insights from Customer Conversations
Powered by GitBook
On this page
  • vCons are "PDFs" for Conversations
  • vCons are an Essential Tool in the Management of Personal Data
  • vCons are Open
  • vCons are mostly After the Fact
  • vCons are the CDR Format for the age of AI

Was this helpful?

Edit on GitHub
Export as PDF
  1. vCons

vCons are...

A Brief Introduction to vCons and the Conserver

vCons are "PDFs" for Conversations

A vCon describes a conversation that involves a "natural" person. As a simple example, a vCon could be created from the last conversation you had with a customer service agent. Just like PDFs allow you to create and share any written document; vCons allow you to create and share any human conversation. A vCon identifies the people in the call, recordings and transcripts, analysis and supporting attachments, like documents and logs. Implemented in easy to manage JSON, vCons are both encryptable and tamper proof.

vCons are an Essential Tool in the Management of Personal Data

By defining the contents and participants of a conversation, vCons enable software tools that are able assert the presence, the absence and the authenticity of personal and biometric information. By tracking and consolidating the interactions with external systems with personal data, vCons enable responsible management of "Right to be Forgotten" regulations. vCons are best understood as a functional toolset for fine-grained control of personal information, authenticity, context and ethical treatment of personal data.

vCons are Open

vCons are both an open source project, it is also an open standards effort supported by the IETF. vCons enable the Internet to work better by defining the interchange standard for our most personal information: the sounds of of voice, and the images of our face. vCons enable the responsible management of personal data, enabling true compliance to customer data protections such as "Right to Know".

vCons are mostly After the Fact

Although you can build a vCon as a conversation happens, they are mostly understood to be an expression of a conversation that happened. vCons are primarily concerned with the responsible use of recorded conversations of all kinds. vCons are intended to be an effective tool for companies seeking GDPR compliance while handling recorded business conversations, which often contain sensitive biometric data.

vCons are the CDR Format for the age of AI

The conserver and vCons allows data controllers to be compliant in the age of AI:

  • vCons track the external systems, including AI, transcribers, redactors and analysis, enabling an authoritative answer to "What systems have seen my personal data?"

  • vCons and the conserver enable compliance to GDPR requirements, including "Right to Know", "Right to be Forgotten" and for responding to regulator audits for sensitive biometric information

  • vCons and the conserver allow you to share conversations across security boundaries, tracking shared data and requesting remote deletion.

PreviousA vCon PrimerNextWhy vCons?

Last updated 10 months ago

Was this helpful?

🌎