GLACIS × nVoq

Enter password to view

Enterprise Partnership Enablement

GLACIS × nVoq

Cryptographic Proof of PHI Protection for Every Patient Encounter

Prove Redaction Executed Zero-Egress Architecture Audit-Ready Evidence

Prepared for nVoq Leadership | December 2025

The Enterprise Challenge

PHI Leakage Fear Is Blocking Deals

"They are very concerned about PHI data leakage. To the point where they restrict use of de-identified data."

-- Enterprise customer feedback

The Trust Gap

Enterprise healthcare customers have been burned by third-party vendors. Even de-identified data feels risky without proof it was properly handled.

The Evidence Problem

nVoq runs Comprehend Medical, but can you prove it executed for transcription #847,293 six months later when OCR asks?

$2M+
HIPAA Violation Fine

Per PHI breach incident

96M
Lines in Snowflake

Each needing provable protection

The Deal Blocker: Enterprise customers need assurance for their agency customers that PHI will NOT leak from nVoq's platform. Promises aren't enough.

Current Architecture Gap

You Have Detection. You Need Proof.

What nVoq Has Today

Custom PHI Scrubber + Comprehend Medical

PHI detection pipeline built on proven infrastructure. Works well for scrubbing.

Consent Capture UI

Clinicians verify consent before recording. Box pops up, they click yes.

MSSA Language

Contractual protection for data usage with agency opt-outs.

What's Missing

Cryptographic Attestation

No mathematical proof that PHI redaction actually ran for any specific transcription.

Consent Evidence Chain

Checkbox clicks are stored, but not cryptographically linked to the transcription they authorized.

Audit-Ready Exports

When OCR or an insurer asks for evidence, you're reconstructing logs--not producing receipts.

The question enterprise customers are asking: "If a PHI breach occurs, can nVoq prove--with cryptographic certainty--that their protections actually executed?"

The Solution

Cryptographic Receipts for Every Patient Encounter

Clinician

Taps Record

->

Consent

Attested

->

Wrapping Comprehend

GLACIS

Attests Redaction

->

Receipt

Proof it ran

Consent Attestation

Cryptographic proof that clinician verified consent before PHI processing began. Timestamped, signed, immutable.

Redaction Verification

Proof that Comprehend Medical (or your custom pipeline) executed for this specific transcription with result logged.

Data Boundary Proof

Evidence that data only routed to approved endpoints. No PHI leaked to unauthorized destinations.

<50ms
Added Latency
0
PHI Egress to GLACIS
100%
Transcriptions Attested

Offline Verification: Enterprise security teams can verify any receipt with network disabled. No trust in GLACIS required--just math.

Your New Competitive Advantage

What nVoq Can Tell Enterprise Customers

“We're the only ambient scribe that can cryptographically prove PHI protection for every single patient encounter.”

This becomes your differentiation against Nuance, iModels, and every other scribe vendor in the post-acute space.

For Enterprise Agency Customers

Audit-ready evidence for HIPAA 164.312 access controls
Proof of consent capture for every recording
Cryptographic receipts exportable for OCR inquiries
Insurance-grade documentation for liability protection

Deal Acceleration

GLACIS transforms enterprise conversations from "trust us" to "here's mathematical evidence." This collapses months of legal review into technical validation.

Device-Level Protection

nVoq stores audio on tablets for offline use. GLACIS can attest encryption status and data boundaries even before upload--addressing the "lost device = HIPAA breach" concern.

Expert Determination Support

Your legal team wants expert determination as the gold standard. GLACIS provides cryptographic proof that your de-identification pipeline executed correctly for each record--evidence your expert can rely on.

Integration

Fits Your Existing Architecture

Works With Comprehend Medical

GLACIS wraps your existing PHI detection pipeline. No rip-and-replace. Comprehend continues to do the work; GLACIS provides the proof.

Edge-Native Deployment

Runs on Cloudflare Workers or AWS Lambda@Edge. Latency added: <50ms. No centralized SaaS bottleneck.

Zero PHI to GLACIS

We only see hashes and policy results. Raw audio, transcriptions, and PHI never leave nVoq infrastructure.

// Consent attestation

const consent = await glacis.attest({

event: 'consent_verified',

clinician_id: clinician.id,

timestamp: Date.now()

});

// PHI redaction attestation

const result = await glacis.attach(

comprehendCall,

'hipaa_phi_redaction'

);

Replaces Point Solutions: GLACIS provides continuous verification without the complexity of stitching together multiple AWS services like Macie.

Proposal

90-Day Design Partnership

Phase 1: Integration (Weeks 1-4)

Deploy GLACIS sidecar alongside existing Comprehend pipeline. Observe mode--attestations generated but not enforced. Zero production risk.

Phase 2: Validation (Weeks 5-8)

Test with subset of pilot agencies. Validate attestation coverage, latency impact, and audit export format.

Phase 3: Production (Weeks 9-12)

Full enforcement. Every transcription from pilot agencies generates cryptographic receipt. Build case study for enterprise deals.

Commercial Structure

$0
Upfront Pilot Fee

Upon successful completion: 12-month enterprise license at $25K ARR

Deliverables

Production attestation pipeline
Enterprise-ready compliance documentation
OSCAL export for auditors
Offline verification toolkit

Success Criteria

<50ms p95 latency in production
100% of pilot transcriptions attested
Audit exports approved by nVoq compliance
Joint presentation to enterprise customer

Close Enterprise Deals

with cryptographic proof that PHI stays protected

Every
Transcription
Proven
Protected
0
PHI to GLACIS

Ready to explore the pilot?

[email protected] | glacis.io

AI2 Incubator | Cloudflare Launchpad