How we use your data
The plain-English read. What we collect, what we do with it, where it sits, and the things we will never do. No clauses.
Read the data pageSecurity and trust
Your security team should not have to take a sales deck on faith. SOC 2 Type 1, UK GDPR, UK data residency, per-tenant isolation, and a hard line on model training. Here is what we hold, in plain English, with the pack to back it.
The controls
Every claim on this page is documented elsewhere on the site, in the DPA, or in the security review pack. If a detail is not written down, we do not state it.
Audited by A-LIGN in 2025, covering Security, Availability, and Confidentiality. The report is available to customers and prospects under NDA.
Handle Technologies Ltd is UK-headquartered. We process data under UK GDPR with standard contractual clauses and the UK Addendum for any international transfer.
The Platform runs on Google Cloud Platform. The primary database sits in the London region. The path your data takes is documented, not assumed.
Customer data is never used to fine-tune any LLM. Not by us, not by the AI providers we use. Inference only. Their enterprise terms cover this; our DPA codifies it.
Company-level isolation. No customer’s data is ever accessible to another customer. A coach on your account cannot see anything from anyone else’s.
Architecture, the full sub-processor list, and the SOC 2 report sit in one pack. Available under NDA, so your security team can do their job before you sign.
Independent penetration testing runs annually against the Platform. Findings are remediated on a tracked timeline, and the latest report is available to customers under NDA.
Type 1 covers the design of our controls. Type 2 covers them operating over time, and we are in the observation window now. The completed Type 2 report follows on the standard timeline.
The detail
Where it sits
The Platform and primary database run on Google Cloud Platform in the London region. AI provider calls reach US infrastructure under standard contractual clauses and the UK Addendum, the same legal scaffolding every UK SaaS uses for international transfers. We do not hide the exception. We document it. * A US-managed variant is on the way for US customers who need their primary data in-region; talk to us if that is a requirement.
Who touches it
There is no quiet list. The full set of sub-processors, with location and processing detail, lives in Annex 2 of the DPA. We notify customers 14 days before adding a new one, and you get the right to object.
What we never do
No customer data is used to fine-tune any LLM, ours or a provider’s. It is not sold, not shared with other customers, not turned into a derivative product. The coaching runs on inference against your data, and then your data stays yours.
The documents
The plain-English read. What we collect, what we do with it, where it sits, and the things we will never do. No clauses.
Read the data pageThe binding document. Roles, security obligations, sub-processing rules, and the full sub-processor list in Annex 2.
Read the DPAArchitecture, the full sub-processor list, and the SOC 2 Type 1 report. Available under NDA for security and procurement review.
Request the packFAQ
The review pack covers architecture, sub-processors, and the SOC 2 report. Request it under NDA and let them do a proper review before you commit.
Request the security pack