Our Commitment to Compliance, Security, and Trust

We build trust by embedding the highest standards of security and regulatory compliance into every aspect of our platform.

Adherence to Industry Standards

Our platform is designed to meet and exceed the requirements of key UK regulations for data protection, health data, and financial services.

🇪🇺

GDPR Compliance

We are fully compliant with GDPR. We operate on a principle of explicit user consent for all data collection, provide anonymization for reports, and uphold users' right-to-be-forgotten.

🇬🇧

NHS Data Security

We adhere to the NHS Data Security and Protection Toolkit for handling all health data, ensuring it is managed to the highest standard required by the UK health system.

🌐

ISO 27001

Our information security management system is compliant with ISO 27001, the international standard for managing information security, backed by regular penetration testing and vulnerability scans.

💷

FCA Compliance

We ensure compliance with the Financial Conduct Authority by providing transparent pricing and clear service descriptions to meet fair value requirements for premium finance.

Web Accessibility

Our website is designed for accessibility and complies with WCAG 2.1 standards. We provide features like screen reader support and high-contrast modes to ensure an inclusive user experience.

⚙️

Healthcare Interoperability

We use the HL7 FHIR UK Core standard for integrations with the NHS App and insurers, ensuring our data practices align with UK healthcare interoperability requirements.

Built on a Foundation of Security

Our commitment to compliance is supported by robust, state-of-the-art security measures at every level of our platform.

End-to-End Encryption

All data in transit is protected using strong end-to-end encryption (TLS 1.3).

Multi-Factor Authentication (MFA)

All user accounts are secured with mandatory MFA to prevent unauthorized access.

Role-Based Access Control

Data access is strictly limited based on user roles, ensuring users can only see the information relevant to them.

Regular Security Audits

We conduct regular, independent penetration tests and vulnerability scans to proactively identify and address potential threats.