Trust & Security

Security at SwiftBid

Your tender documents contain commercially sensitive information. We treat their protection as our highest priority.

lock

Encryption

All data is protected with industry-standard encryption at every stage:

  • check_circle In transit: TLS 1.3 encryption for all data transmitted between your browser and our servers.
  • check_circle At rest: AES-256 encryption for all stored documents and generated outputs.
shield

Data Isolation

Every bid is processed in a fully isolated environment. Your documents are never mixed with, accessible to, or influenced by other clients' data.

Each AI processing session is sandboxed with its own context, ensuring complete separation between client workloads at all times.

block

No Training on Your Data

Your uploaded documents and generated bid outputs are never used to train AI models. Your proprietary information, trade secrets, and competitive intelligence remain exclusively yours.

We use API-level agreements with our AI providers that explicitly prohibit the use of input data for model training or improvement.

auto_delete

30-Day Deletion Policy

All uploaded documents and generated outputs are permanently deleted 30 days after delivery. This applies to all storage locations, including backups and processing caches.

You may also request immediate deletion at any time by contacting our support team. Deletion requests are fulfilled within 24 hours.

cloud

Cloudflare Infrastructure

Our platform is built on Cloudflare's global infrastructure, providing:

  • check_circle Enterprise-grade DDoS protection and Web Application Firewall (WAF).
  • check_circle Global edge network with automatic failover for high availability.
  • check_circle Bot management and rate limiting to prevent abuse.
verified_user

Compliance & SOC 2

We are actively working towards SOC 2 Type II certification, covering the Trust Service Criteria of security, availability, and confidentiality.

Our current security controls are designed and implemented in alignment with SOC 2 requirements, and we engage in regular internal audits and vulnerability assessments.

Additional Security Measures

check_circle Access Controls

Role-based access control (RBAC) with least-privilege principles for all internal systems.

check_circle Audit Logging

Comprehensive logging of all access and processing events for security monitoring and incident response.

check_circle Incident Response

Documented incident response procedures with notification within 72 hours as required by UK GDPR.

Report a Security Concern

If you discover a security vulnerability or have concerns about data protection, please contact us immediately. We take all reports seriously and will respond promptly.

SwiftBid Security Team

Email: security@swiftbid.co.uk

For responsible disclosure, please allow us reasonable time to investigate and address any reported vulnerabilities before public disclosure.