Skip to content

Security at Thesmia

We take it seriously.

Our approach to security

At Thesmia, we understand that HR data is sensitive by nature. While we are an early-stage product, security and data protection are not an afterthought, they are built into how we design, host, and operate the platform.

We aim to be transparent about what we do today, how risks are mitigated, and where responsibility sits between Thesmia and our underlying infrastructure providers.

We do not claim independent ISO 27001 or SOC certification at this stage. However, Thesmia is built on enterprise-grade infrastructure and services that are themselves ISO 27001 / SOC 2 compliant, and we follow security best practices aligned to those standards. 

Quick reassurance

  • Hosted on cloud infrastructure that meets ISO 27001 / SOC standards
  • Data encrypted in transit and at rest (via underlying providers)
  • No employee data used to train AI models
  • Access restricted to authorised personnel only
  • Regular patching and dependency updates
  • Clear separation between customer data and application logic

If you need more detail, the sections below explain exactly how Thesmia handles security.

Infrastructure & hosting

Hosting location
Thesmia is hosted on reputable cloud infrastructure providers with data centres located in regions aligned with UK and EU data protection expectations.

Infrastructure compliance
Our hosting and core service providers maintain recognised security certifications, including:

ISO 27001

SOC 2

While Thesmia itself is not currently certified, we rely on these providers’ audited controls for physical security, network security, and resilience.

Data protection & privacy

Customer data usage

Customer inputs are used only to provide the Thesmia service.

We do not use customer data to train or fine-tune AI models.

We do not sell or share customer data with third parties for advertising or profiling.

Data minimisation
We encourage customers not to enter personal or identifiable employee data into prompts. Thesmia is designed for strategic comms and planning, not record-keeping.

Retention
Data is retained only for as long as required to operate the service and support users.

AI & model security

Thesmia uses large language models via trusted AI providers.

Customer prompts are processed securely.

Inputs are not used to train shared models.

We design prompts and system logic to minimise hallucinations and unsafe outputs.

Thesmia is intended as a decision-support tool, not an autonomous system.

Human review remains essential for all outputs.

Access control & authentication

Access to production systems is restricted to a small number of authorised team members.

Role-based access is used wherever possible.

Credentials are managed securely and rotated where appropriate.

Administrative access is logged and monitored via underlying infrastructure tooling.

Updates, patches & vulnerability management

Dependencies and libraries are kept under active review.

Security patches are applied promptly where risks are identified.

Infrastructure providers handle OS-level and network-level patching.

We monitor upstream advisories from vendors we depend on.

Backups & resilience

Infrastructure-level backups are managed by our hosting providers.

Systems are designed to be recoverable in the event of failure.

We rely on provider-level redundancy and availability guarantees.

Onboarding & offboarding

Team access is granted on a need-to-know basis.

Access is removed promptly when roles change or team members leave.

No shared credentials are used for critical systems.

Key risks & mitigations

Risk Mitigation
Unauthorised access Restricted access, secure authentication, provider-level controls
Data leakage Encryption, provider isolation, no model training on customer data
AI hallucinations Guardrails, prompt design, human-in-the-loop expectation
Dependency vulnerabilities Regular updates and monitoring
Human error

Minimal access, documented processes

Certifications & roadmap

At present, Thesmia does not hold independent ISO 27001 or SOC certification.

As the product and customer base grow, we intend to:

  • Continue aligning internal practices with recognised security frameworks

  • Formalise documentation and controls

  • Evaluate certification when proportionate and appropriate

We believe in earning trust through transparency, not overstating maturity.

Responsible disclosure

If you believe you’ve found a security issue, please contact us at:
📧 Emma@thesmia.ai

We take responsible disclosure seriously and will investigate promptly.

Questions?

We’re happy to answer reasonable security or data protection questions from customers, IT teams, or DPOs.

📩 Contact: Emma@thesmia.ai