Compliance
Our Principles
Full Code Ownership
Source code, models, documentation. All yours. No lock-in, no proprietary dependencies, no reason to stay except the quality of the work.
GDPR Aligned
EU-registered. GDPR-aligned data handling across every engagement. Compliance is how we operate, not a box we tick.
Privacy by Design
Minimal data collection. Anonymisation where possible. User control built in. Privacy is an architecture decision, not a policy afterthought.
Plain Speaking
We state our capabilities and our limitations. No hidden terms, no fine print that contradicts the headline.
Ethical Boundaries
No surveillance, no manipulation, no harmful applications. We decline projects that conflict with these principles.
Secure by Default
Encryption, access control, and secure architecture ship with every deliverable. Standard, not optional.
Security
How We Work
How We Build
- Security-first architecture
- Code review and testing
- Secure dependency management
- Encryption at rest and in transit
How We Handle Data
- Data handling agreed upfront
- Minimal data collection
- Anonymisation where possible
- GDPR-aligned processing
How We Deliver
- Full source code handover
- Documentation included
- Independent auditability
- No vendor lock-in
How We Communicate
- Transparent about capabilities
- Honest about limitations
- Clear data handling terms
- Direct access to our team
