Your HR data deservesserious protection
We handle sensitive employee data every day. That's why we've built security and privacy into every layer of the product - not as an afterthought.
Defence in depth
Multiple layers of protection for your data, from encryption to access controls.
Encryption at Rest
All employee data encrypted with AES-256-GCM. Each company gets a unique Data Encryption Key (DEK) that can be rotated independently.
Two-Tier Key Architecture
Company DEKs are wrapped by a master key. This means per-company key rotation without re-encrypting all data - essential for incident response.
Encryption in Transit
All data transmitted over TLS 1.3. API calls to AI providers use encrypted channels with certificate pinning.
Role-Based Access
Employees see their own data. Managers see their direct reports. HR sees everyone. Every data access verified against role permissions.
Fine-grained access control
Every query, every profile write, every action is checked against a strict access control model. No shortcuts.
Employee Self-Service
Employees can read and write to their own profile. Ask about their leave, update their details, request time off.
Manager Team Access
Managers can view and annotate profiles of their direct reports. Can't access other teams.
HR Full Access
HR administrators can access all profiles and restricted data. Required for compliance and employee relations.
Restricted Profiles
Sensitive information (performance concerns, grievances) goes to restricted profiles that only HR can read - even from the employee themselves.
Every action is attributed
2024-01-15 14:32:01 UTC
2024-01-14 09:15:22 UTC
2024-01-14 11:05:17 UTC
GDPR & Data Protection
Built for UK and EU data protection requirements from day one.
Right to Access
Employees can request a copy of all their personal data. We provide a complete export including profile data, conversation history, and audit logs.
Right to Erasure
Employees can request deletion of their personal data. We support complete deletion workflows that remove data from all systems including backups.
Data Portability
Export employee data in standard formats (JSON, CSV) for transfer to another provider. Makes switching easy - no vendor lock-in.
Data Retention
Configurable retention policies. Automatic cleanup of old data. Audit logs retained separately for compliance requirements.
UK GDPR Compliant
Compliant with UK data protection law.
EU Data Processing
Standard contractual clauses for EU data transfers where required.
Lawful Basis
Clear lawful basis for processing. Legitimate interest and contract performance.
Complete audit trail
Every action logged. Every access recorded. Full accountability.
Immutable Logs
Audit events are append-only. Cannot be modified or deleted.
Actor Attribution
Every action tagged with who did it, when, and from where.
Data Access Logs
Know exactly who accessed employee data and when.
Policy Changes
Full version history of all company policy amendments.
AI processing & third parties
How we use AI
We use OpenAI's GPT models to power the conversational interface. Here's what you should know:
- PII redacted before processing - Personal identifiers are stripped before data reaches the LLM
- No model training - Your data is not used to train AI models (OpenAI API ToS)
- Data processing agreement - We have a DPA in place with our AI provider
- Minimal context - Only relevant data is included in each query, not your entire dataset
Technical specifications
Encryption
- AES-256-GCM for data at rest
- TLS 1.3 for data in transit
- PBKDF2 key derivation with high iteration count
- Per-company Data Encryption Keys (DEKs)
- Master Key wrapping for DEK management
Infrastructure
- Hosted on major cloud provider (ISO 27001 certified)
- Data encrypted at rest in database
- Regular automated backups
- DDoS protection and WAF
Access Controls
- Authorization enforced on every query and mutation
- Role-based permissions (Employee, Manager, HR)
- Org chart-driven manager relationships
- Restricted profile access for sensitive data
- Session-based authentication with secure tokens
Audit & Monitoring
- Immutable audit log for all data changes
- Actor attribution on every write
- Query logging for data access
- Policy version history with timestamps