Security & Trust

We take data security seriously. Here’s how we protect your business information.

How we protect your data

Isolation

Each client runs in its own secure workspace. Private files are read-write. Shared resources are read-only. Nothing crosses the boundary without explicit permission.

Data Ownership

Your data belongs to you. We process it only to run your workflows. You can export or delete your data at any time. We never sell or share your information with third parties.

Access Controls

Role-based access ensures team members only see what they need. Admin controls let you manage permissions, revoke access, and set up approval workflows for sensitive operations.

Human Approvals

Sensitive actions require explicit sign-off. The workflow pauses until a designated approver grants permission. Every approval is logged and auditable.

Audit Logs

Every agent action, tool call, data access, and configuration change is logged with full traceability. Audit trails are exportable for compliance and operational review.

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256. API keys and credentials are stored in isolated, encrypted vaults.

Infrastructure

Hosted on UK-based cloud infrastructure with automatic failover and regular backups. We maintain 99.9% uptime SLA for production workflows.

AI & Privacy

Your business data is never used to train AI models. Agent outputs are processed and discarded. Your competitive advantage stays yours.

Incident Response

Documented incident response procedures with automatic anomaly detection. If a breach occurs, you are notified within 24 hours with a full remediation plan.

We follow UK data protection standards and are committed to maintaining the highest levels of security. For specific compliance questions, please get in touch.