Enterprise-grade security

Your HR data deservesserious protection

We handle sensitive employee data every day. That's why we've built security and privacy into every layer of the product - not as an afterthought.

Defence in depth

Multiple layers of protection for your data, from encryption to access controls.

Encryption at Rest

All employee data encrypted with AES-256-GCM. Each company gets a unique Data Encryption Key (DEK) that can be rotated independently.

Two-Tier Key Architecture

Company DEKs are wrapped by a master key. This means per-company key rotation without re-encrypting all data - essential for incident response.

Encryption in Transit

All data transmitted over TLS 1.3. API calls to AI providers use encrypted channels with certificate pinning.

Role-Based Access

Employees see their own data. Managers see their direct reports. HR sees everyone. Every data access verified against role permissions.

Fine-grained access control

Every query, every profile write, every action is checked against a strict access control model. No shortcuts.

Employee Self-Service

Employees can read and write to their own profile. Ask about their leave, update their details, request time off.

Manager Team Access

Managers can view and annotate profiles of their direct reports. Can't access other teams.

HR Full Access

HR administrators can access all profiles and restricted data. Required for compliance and employee relations.

Restricted Profiles

Sensitive information (performance concerns, grievances) goes to restricted profiles that only HR can read - even from the employee themselves.

Every action is attributed

Profile Update
Performance feedback added
Written by Sarah Manager (manager)
2024-01-15 14:32:01 UTC
Restricted Profile Update
Confidential note added
Written by HR Team (hr)
2024-01-14 09:15:22 UTC
Profile Query
"What training has Dave completed?"
Queried by Sarah Manager
2024-01-14 11:05:17 UTC

GDPR & Data Protection

Built for UK and EU data protection requirements from day one.

Right to Access

Employees can request a copy of all their personal data. We provide a complete export including profile data, conversation history, and audit logs.

Right to Erasure

Employees can request deletion of their personal data. We support complete deletion workflows that remove data from all systems including backups.

Data Portability

Export employee data in standard formats (JSON, CSV) for transfer to another provider. Makes switching easy - no vendor lock-in.

Data Retention

Configurable retention policies. Automatic cleanup of old data. Audit logs retained separately for compliance requirements.

UK GDPR Compliant

Compliant with UK data protection law.

EU Data Processing

Standard contractual clauses for EU data transfers where required.

Lawful Basis

Clear lawful basis for processing. Legitimate interest and contract performance.

Complete audit trail

Every action logged. Every access recorded. Full accountability.

Immutable Logs

Audit events are append-only. Cannot be modified or deleted.

Actor Attribution

Every action tagged with who did it, when, and from where.

Data Access Logs

Know exactly who accessed employee data and when.

Policy Changes

Full version history of all company policy amendments.

AI processing & third parties

How we use AI

We use OpenAI's GPT models to power the conversational interface. Here's what you should know:

  • PII redacted before processing - Personal identifiers are stripped before data reaches the LLM
  • No model training - Your data is not used to train AI models (OpenAI API ToS)
  • Data processing agreement - We have a DPA in place with our AI provider
  • Minimal context - Only relevant data is included in each query, not your entire dataset

Technical specifications

Encryption

  • AES-256-GCM for data at rest
  • TLS 1.3 for data in transit
  • PBKDF2 key derivation with high iteration count
  • Per-company Data Encryption Keys (DEKs)
  • Master Key wrapping for DEK management

Infrastructure

  • Hosted on major cloud provider (ISO 27001 certified)
  • Data encrypted at rest in database
  • Regular automated backups
  • DDoS protection and WAF

Access Controls

  • Authorization enforced on every query and mutation
  • Role-based permissions (Employee, Manager, HR)
  • Org chart-driven manager relationships
  • Restricted profile access for sensitive data
  • Session-based authentication with secure tokens

Audit & Monitoring

  • Immutable audit log for all data changes
  • Actor attribution on every write
  • Query logging for data access
  • Policy version history with timestamps

Questions about security?

We're happy to discuss our security practices, provide documentation, or answer specific questions for your security review.