We know information about your business is sensitive. Security isn't a feature, it's the foundation we build on. Here's how, in plain language.
An overview of technical and organisational measures under GDPR Art. 32. Design choices, remaining trade-offs and references to relevant standards.
Defence in depth between the application layer and the data layer.
Structured logging (Serilog) with deliberate restraint on personal data in cleartext.
Differentiated handling when exercising the right to erasure (GDPR Art. 17).
Security is treated as an ongoing process, not a one-off check.
Each field is justified by the core service: matching organisations to grants.
What you share is used solely to match you to funding, never to train AI models or share with third parties.
Not a checkbox exercise. Each framework is reflected in how the product is actually built.
Data Processing Agreement (DPA) included for Enterprise. Hard delete on account removal.
Applied for data transfers to subprocessors per Schrems II.
Transparent model documentation, decision support, data handling.
AI detection on drafts, flags passages that need human language.
Federation with Azure AD, Okta, ADFS. Automated lifecycle management.
Available for software and cloud services. ISO 27001 on roadmap.
Clear commitments, so you don't have to guess.
Need a DPA, security overview or threat model for internal audit? Reach out, we'll send it.
Standard template for Enterprise. Adaptable to sector-specific requirements.
Request document → SecurityTopology, data flows, encryption strategy, access model.
Request document → AI ActEU AI Act-conformant: model choice, training data, decision support, threat model.
Request document →Compliance questions are typically answered within one business day. For Enterprise evaluation we book a technical walkthrough with our DPO.