The right response to giving a third party access to your operations is scrutiny. Here is exactly what we access, how we protect it, and how you stay in control.
Most of what we build moves data directly between your platforms. No external processing sees it.
For managed processing, the data is tokenised before it reaches any processing engine.
The processing engine works with structure and logic. It never sees the real data. Tokens are re-mapped after processing.
Your data is never used to train any system.
Our systems improve over time. That requires seeing operational data. Here is exactly how that works — and where the boundaries are.
Think of it like a GP practice. The practice owns the building, the records system, and the security around it. But each patient's records are theirs — private, auditable, and destroyed or transferred when the relationship ends. We host the infrastructure. Your data stays yours.
The four questions that matter most — answered directly.
A detailed technical annex covering VPN specifics, connector architecture, audit log retention, and business continuity is available for your IT team under NDA.