Security & Compliance

Enterprise AI needs clear operating boundaries.

CX Hero deployments are scoped around approved content, agreed integrations, defined permissions, GDPR-aware data handling, and client-specific access controls before launch.

Data handling

Scoped per deployment

Each project defines what content, interaction data, system access, and operational records are needed for the approved use case.

Infrastructure

Enterprise cloud hosted

CX Hero is designed for secure, scalable deployment with encrypted communications, managed access, and client-specific configuration.

Governance

Review before launch

Security, privacy, permissions, integrations, and escalation paths are reviewed as part of onboarding.

GDPR-aware deployment

Data protection is treated as part of the operating model.

CX Hero can support UK and EU GDPR-aware deployment planning, including defined purposes for processing, access controls, data handling review, and client-specific documentation where required.

  • Approved-content-only knowledge model for business information.
  • Client-specific permissions and access boundaries.
  • Role-based access planning for administrative users.
  • Data handling and retention requirements reviewed during onboarding.
  • DPA and procurement questionnaire support available on request.
CX Hero Portal hardware for secure deployment planning

Controls

Built around approved systems and accountable access.

Where CX Hero Actions connect to business systems, the workflow is scoped around available APIs, permissions, review, and operational approval.

Access controls

Client-specific permissions

Administrative access and connected systems are configured around the deployment's approved roles and responsibilities.

Actions

Approved integrations only

CX Hero Actions depend on authorised access, defined workflows, data handling review, and reliable system connection points.

Audit readiness

Clear scope and records

Procurement and compliance teams can request deployment scope, data handling, support, and integration information before launch.

Digital Human identity

Premium identity work requires explicit approval.

Face cloning and voice cloning are paid one-off add-ons. They should only be used with approved source material, documented permission, and a clear commercial use case.

Face cloning

£499 one-off

Created from approved source material for a defined deployment, subject to client sign-off.

Voice cloning

£499 one-off

Created from approved source material for commercial deployment use, subject to client sign-off.

Bespoke attire

Quoted on request

Custom attire is scoped separately because design, approvals, and deployment context vary.

Procurement support

Security review should happen before integration work starts.

For enterprise deployments, CX Hero can support procurement and security review with the information needed to scope risk properly.

DPA

Available on request

Data processing terms can be reviewed during procurement where required.

Questionnaires

Security responses

Security and supplier questionnaires can be supported as part of the sales process.

Retention

Defined during scope

Retention needs are reviewed around the specific interaction, analytics, and integration model.

Contact

Start with the deployment

Security requirements are easiest to review once the location, data, systems, and workflows are known.

Need security information for procurement?

Share the deployment context, systems involved, data handling needs, and procurement requirements so CX Hero can respond with relevant information.