Security

Tender Security and Data Handling

Tender documents contain commercially sensitive information. We use encryption, access controls and audit logging to protect your data throughout the bid process.

Data Encryption

All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Your tender documents and responses are protected with industry-standard encryption.

Secure Infrastructure

Hosted on enterprise-grade cloud infrastructure with ISO 27001-certified providers. Access controls, regular security reviews and redundancy to support reliable service availability.

Access Controls

Role-based access control (RBAC) ensures users only see what they need. Audit logs track all actions for accountability.

Data Retention

Configurable data retention policies. Delete your data at any time with full audit trail. Data handling designed to support UK GDPR compliance.

Our Security Approach

Data handling designed to support UK GDPR compliance
Security controls aligned with ISO 27001 principles and Cyber Essentials framework
Enterprise-grade encryption, access control, and audit logging
Infrastructure hosted with providers maintaining ISO 27001 and SOC 2 certifications

We continuously review and improve our security practices. For specific compliance enquiries relevant to your organisation's requirements, please contact us.

Our Security Practices

Regular Security Reviews

We conduct regular security reviews and assessments to identify and address potential vulnerabilities.

Team Training

All team members complete security awareness training and follow strict data handling procedures.

Incident Response

We maintain an incident response plan with defined escalation procedures and communication protocols.

Vendor Assessment

Third-party service providers are assessed for security practices before integration.

Report a Security Concern

If you discover a security vulnerability, please report it to our team immediately.

Contact Security Team