Skip to main content

Security & Safety Built Into Every Step

Enterprise-grade security powered by Google Cloud Platform. Your data is safe, secure, and completely under your control.

100%
Google Cloud Platform
Zero
Personal or Clinical Data
Immediate
Deletion After Project

Complete Google Cloud Platform Stack

Every component of our technology stack runs on Google Cloud Platform, giving you enterprise-grade security, reliability, and compliance.

Why Google Cloud Platform?

Enterprise Security

  • • ISO 27001, SOC 2/3 certified
  • • GDPR and UK data protection compliant
  • • Encryption at rest and in transit
  • • Regular third-party security audits

Data Sovereignty

  • • UK and EU data centres only
  • • Your data never leaves your region
  • • Full control over data location
  • • Compliant with NHS and public sector requirements

Reliability

  • • 99.95% uptime SLA
  • • Automatic backups and redundancy
  • • Global infrastructure with local presence
  • • 24/7 monitoring and support

Managed AI Safety

  • • AI managed by Fit to Care specialists
  • • No direct access to AI systems
  • • Guardrails and safety controls built-in
  • • Continuous monitoring and oversight

How Your Knowledge Bases Stay Safe

Your files are transformed into secure, fast, and efficient knowledge bases. Here's exactly how it works:

1

You Provide Files

You share your documents, strategy papers, reports, and data files with us through secure, encrypted transfer.

Security: Encrypted transfer via Google Cloud Storage. Files stored in UK/EU data centres only.

2

We Analyse & Optimise

Our AI systems (managed by Fit to Care specialists) analyse your content, extract key information, and optimise it for fast, efficient retrieval.

Security: Processing happens in isolated Google Cloud environments. No human access to your data during this stage. AI managed by Fit to Care, not self-service.

3

Optimised for Embedding

Content is transformed into mathematical representations (embeddings) that enable fast, semantic search while maintaining security.

Security: Embeddings created using Google's Vertex AI. Your content remains encrypted and isolated in your dedicated environment.

4

Loaded to Vector Database

Embeddings are stored in a secure vector database (Google Cloud Vertex AI Vector Search), ready for lightning-fast retrieval.

Security: Stored in Google Cloud Vertex AI Vector Search with encryption at rest. Access controlled by strict identity and access management (IAM) policies.

5

Fast, Efficient, Real Search

Your knowledge base is now ready. Search and context retrieval is fast, efficient, and real. It's your content, your knowledge, your control.

Result: Lightning-fast semantic search across your documents. Only your approved content is used—never random web information.

It's Real

Your actual documents and data, not generic web information. The AI uses only your approved, trusted sources.

It's Yours

Your content, your control. We never use your data to train models or share it with third parties.

It's Fast

Optimised vector search delivers instant results, even across thousands of documents.

What We Focus On

Our AI systems are designed for business processes, not personal or clinical data.

What We Focus On

  • Business processes: Strategy development, decision-making, meeting intelligence
  • Organisational data: Strategy documents, reports, meeting notes, business plans
  • Aggregated insights: Patterns, trends, and themes across your organisation
  • Anonymised workforce data: Activity patterns, communication flows (no individual identification)

What We Don't Touch

  • Personal data: No individual employee information, personal details, or identifiable data
  • Clinical data: No patient records, medical information, or clinical systems
  • Sensitive personal information: No HR records, performance reviews, or disciplinary data
  • Third-party sharing: Your data is never shared, sold, or used to train public models

Our Principle: We help organisations make better decisions faster by analysing business processes and organisational data. We never need access to personal or clinical information to deliver value.

AI Managed by Fit to Care

Because AI is managed by Fit to Care specialists, AI is safe. You never have direct access to AI systems, we handle everything.

Professional Service Model

  • • Fit to Care specialists manage all AI interactions
  • • No self-service access to AI systems
  • • Expert oversight on every query and output
  • • Human-in-the-loop for all critical decisions

Built-in Guardrails

  • • Content filtering and safety controls
  • • Restricted to your approved knowledge bases
  • • No internet access or external data sources
  • • Continuous monitoring and audit trails

Quality Assurance

  • • All outputs reviewed by specialists
  • • Accuracy verification against source documents
  • • Bias detection and mitigation
  • • Regular quality audits and improvements

Accountability

  • • Clear responsibility and ownership
  • • Traceable decision-making processes
  • • Professional indemnity insurance
  • • Compliance with AI ethics guidelines

Why This Matters

Self-service AI tools can be unpredictable and risky. By managing AI on your behalf, we ensure safety, quality, and accountability at every step.

Immediate Deletion After Project Completion

Your content and files are immediately deleted after your project completes. No exceptions.

Our Data Deletion Policy

What Gets Deleted

  • • All original files you provided
  • • All processed and analysed content
  • • All embeddings and vector database entries
  • • All knowledge bases and search indices
  • • All temporary files and processing artefacts

When It Gets Deleted

  • • Immediately upon project completion
  • • Within 24 hours of final deliverable
  • • Automated deletion process with audit trail
  • • Confirmation provided to you in writing

What We Retain (If Agreed)

  • • Only aggregated, anonymised insights (with your explicit permission)
  • • Project metadata (project name, dates, deliverables—no content)
  • • Invoices and financial records (legal requirement)
  • • Nothing else—your content is completely deleted

Important: If you want to retain your knowledge bases for ongoing use (e.g., for Meeting Genie Option B), this must be explicitly agreed in your contract. Otherwise, everything is deleted immediately after project completion.

NDA Agreement for Every Project

Every engagement includes a comprehensive Non-Disclosure Agreement (NDA) to protect your confidential information.

What's Covered

  • • All documents and files you provide
  • • All insights and analysis we generate
  • • All discussions and meeting content
  • • All intellectual property and proprietary information
  • • All business processes and strategic plans

Our Commitments

  • • Strict confidentiality of all your information
  • • No disclosure to third parties without permission
  • • Secure handling and storage throughout project
  • • Immediate deletion after project completion
  • • Legal liability for any breaches

Additional Legal Protections

Data Processing Agreement (DPA): For projects involving personal data, we provide a comprehensive DPA compliant with GDPR and UK data protection law.

Professional Indemnity Insurance: We carry professional indemnity insurance covering data breaches, confidentiality breaches, and professional negligence.

ISO 27001 Alignment: Our processes align with ISO 27001 information security management standards.

Right to Audit: You have the right to audit our security practices and data handling procedures at any time.

Security & Safety: Our Promise

🔒

Enterprise Security

100% Google Cloud Platform. ISO 27001, SOC 2/3, GDPR compliant. Your data never leaves UK/EU.

🎯

Business Focus

We focus on business processes, not personal or clinical data. Your strategic work, not sensitive information.

👥

Managed AI

AI managed by Fit to Care specialists. No self-service access. Human oversight on every interaction.

🗑️

Immediate Deletion

All content and files deleted immediately after project completion. NDA for every project.

Questions about security? We're happy to discuss our security practices in detail.

Discuss Security Requirements