Security
Security & Data Handling
How we protect your data and help you adopt AI responsibly. Plain-language answers to common security questions.
Our Commitments
Data handling principles
Clear, straightforward policies for how we handle your information.
We don't train models on your data
Any data shared during consulting sessions is used only for that engagement. We never use client data to train AI models or share it with third parties.
We can run engagements without sensitive data
All exercises can use synthetic, anonymized, or generic examples. You never need to share sensitive business data, PII, or confidential information.
Recommended access controls
We help you implement appropriate access controls, approval workflows, and usage policies for AI tools in your organization.
Tool selection and governance
We provide guidance on evaluating AI tools for security, privacy, and compliance. We help you create governance frameworks appropriate for your industry.
Responsible AI
Our approach to ethical AI
We build responsible AI practices into every engagement.
Transparency
We help teams be transparent about AI use—both internally and with customers when appropriate.
Human Oversight
AI assists but doesn't replace human judgment. We emphasize verification, review, and accountability.
Bias Awareness
We help teams recognize potential biases in AI outputs and implement appropriate checks.
Appropriate Use
Not every task should use AI. We help teams understand when AI is appropriate and when it isn't.
Data Privacy
We emphasize data handling best practices and help organizations protect sensitive information.
Continuous Improvement
AI capabilities and risks evolve. We provide ongoing advisory support to keep teams informed.
Our Process
Security throughout the engagement
Pre-Engagement Assessment
- Review existing data handling policies
- Identify sensitive data categories
- Assess current AI tool usage
- Understand compliance requirements
During Engagement
- Use only synthetic or anonymized data
- Secure virtual environment when needed
- No recording of sensitive discussions
- Clear data handling protocols
Post-Engagement Support
- Policy templates and frameworks
- Governance documentation
- Ongoing security best practices
- Compliance guidance by industry
FAQ
Common security questions
Do you need access to our systems?
No. Engagements can be conducted using your existing tools with screen sharing, or using sandbox environments. We never require access to your internal systems.
What if we work with regulated data (HIPAA, PCI, etc.)?
We have experience in regulated industries. All exercises use synthetic data, and we provide industry-specific guidance on compliant AI use.
Are consulting sessions recorded?
Only with your permission. If recorded, they are shared only with stakeholders and deleted after the agreed retention period.
What happens to materials we share?
Pre-session materials are used only for customization. They're stored securely and deleted within 30 days of engagement completion unless you request otherwise.
Have specific security requirements?
We're happy to discuss your organization's security and compliance needs.