COMPLIANCE & DATA PROTECTION

IT'S YOUR DATA.
NOT OURS.

As facial recognition compliance experts and industry thought leaders, we set the standard for ethical deployment. We operate strictly as your data processor under UK GDPR — we never own, sell, or repurpose your data. Everything we do is built on privacy by design, on your terms, with your consent, and in your control.

DATA PROTECTION | GDPR | PRIVACY

DATA PROCESSOR,
NEVER DATA CONTROLLER.

FaiceTech provides secure, GDPR-compliant facial recognition and ANPR services exclusively for the deterrent of crime and anti-social behaviour. Our organisation and solutions have been designed to exceed the requirements of UK GDPR.

We operate exclusively as your data processor. You control the data, you decide how it's used, and you own all the rights. We never become a data controller, never share your data with third parties, and never use facial data for any purpose beyond what you've explicitly approved.

We've adopted a Privacy by Design approach to the development of all our solutions, ensuring that the features required to enable your organisation to operate compliantly are built in and configurable — not bolted on afterwards.

As Your Data Processor
What This Means For You
  • We process data on your instructions only — you remain the data controller at all times
  • You retain full ownership and control of all biometric and personal data
  • Privacy by Design is built into every solution we develop
  • We provide specialist compliance guidance for processing biometric data
  • We delete or return all data when your contract ends — no exceptions
  • Full transparency and auditability at every stage
END-TO-END OWNERSHIP

WE OWN EVERY
LINE OF CODE.

FaiceTech built its entire platform from the ground up. We don't license algorithms from overseas providers or white-label someone else's technology. When you work with FaiceTech, there's one company responsible for your data — based in the UK, governed by UK law, and answerable to UK regulators.

Many providers in this space license their core technology from third parties — often based in different jurisdictions like the US or Asia. That means your data could be subject to foreign laws, foreign access requests, and data processing agreements you never signed up to. With FaiceTech, the entire chain of custody sits with one company, in one jurisdiction. No middlemen, no hidden sub-processors, no legal grey areas.

Licensed Third-Party Provider

The Hidden Risks

  • Core technology owned by a company in another country
  • Your data may be subject to foreign government access requests
  • Multiple sub-processors across different jurisdictions
  • Limited control over how algorithms process your data
  • Compliance responsibility fragmented across companies
  • Harder to audit the full data processing chain
FaiceTech (End-to-End)

Full Ownership, Full Control

  • 100% UK-built technology — every line of code is ours
  • No foreign government access — UK law only
  • Single data processor — no hidden sub-processors
  • Full transparency into how your data is processed
  • One company, one jurisdiction, one point of accountability
  • Complete audit trail from capture to deletion
Download Our Compliance & Ownership Guide
DATA SOVEREIGNTY

YOUR DATA NEVER
LEAVES THE UK.

All data processing and storage happens on UK soil. Nothing gets routed through US clouds, EU servers, or third-party infrastructure in other jurisdictions. For UK organisations, this means full compliance with UK GDPR without the legal complexity of international data transfers — no adequacy decisions to worry about, no Standard Contractual Clauses needed.

UK Hosted
All infrastructure on UK soil
UK Processed
Data never leaves the country
UK Governed
Subject to UK law only
No Transfers
Zero cross-border data movement
International Clients: FaiceTech supports data sovereignty for businesses outside the UK too. We work with organisations to ensure their data is stored and processed within their own jurisdiction, meeting local regulatory requirements. Talk to us about in-country hosting options.
YOUR WATCHLIST. YOUR DATA. YOUR CONTROL.

EVERY CLIENT RUNS
INDEPENDENTLY.

Each client operates on a completely isolated database and watchlist. Your data is never pooled with other organisations, never shared across deployments, and never accessible to anyone outside your authorised team. You decide who goes on your watchlist, who can access it, and when data gets deleted.

Isolated Databases

Every client gets their own dedicated, ring-fenced database — physically and logically separated.

Client-Controlled Watchlists

You build your own watchlist. You add, remove, and define the rules. We never modify it.

No Shared Data

No central database pools data across clients. Your biometric data and watchlist are yours alone.

Full Deletion Rights

When you say delete, we delete. All data permanently removed on your instruction — verified and documented.

BEYOND COMPLIANCE

HUMAN RIGHTS &
DATA PROTECTION.

Compliance isn't just about ticking boxes. Facial recognition technology intersects with fundamental human rights, and we take that responsibility seriously. Our approach goes beyond what the law requires — we actively consider the human impact of every deployment.

Right to Privacy

Every deployment is assessed for its impact on individuals' right to privacy under the Human Rights Act 1998. We only support use cases with a clear, proportionate, and lawful basis — with regular reviews to ensure ongoing necessity.

Protection from Discrimination

We continuously test our algorithms across demographics to guard against bias. Transparent accuracy reporting and a commitment to Equality Act 2010 principles ensure fair treatment for everyone.

Freedom from Mass Surveillance

We do not support or enable mass surveillance. Every deployment is targeted, purpose-specific, and time-limited. We reserve the right to refuse any project that lacks a clear lawful basis.

Data Subject Rights

Individuals have rights over their biometric data under UK GDPR. We build tools for Subject Access Requests, automated erasure workflows, and clear signage and notification guidance.

UK GDPR

BUILT AROUND THE
7 CORE PRINCIPLES.

Every feature, every decision, and every process we run is built on the seven principles of data protection. These aren't guidelines — they're the foundation of everything we do.

Lawfulness, Fairness & Transparency

We only process data when we have a legal basis to do so. You always know what data we're collecting and why.

Purpose Limitation

Data collected for one purpose stays locked to that purpose. We never repurpose your data without explicit new consent.

Data Minimisation

We collect only the data we need. No excess collection, no "just in case" storage. Minimal by design.

Accuracy

We maintain the highest standards of data accuracy. Inaccurate data is useless. We ensure your data stays correct and up-to-date.

Storage Limitation

Data isn't kept longer than necessary. Once your deployment contract ends, we delete or return your data — no exceptions.

Integrity & Confidentiality

Your data is encrypted, protected, and secured with industry-standard cybersecurity. It can't be lost, stolen, or altered.

Accountability

We take responsibility for every decision. We document, we audit, and we prove compliance through Data Protection Impact Assessments.

OUR RED LINES

WHAT WE WILL
NEVER DO.

These aren't nice-to-haves. These are commitments we'll never break, no matter the business pressure.

Never sell your data to third parties
Never use facial data for our own purposes
Never deploy facial recognition without a Data Protection Impact Assessment
Never process data without a clear lawful basis
Never retain data beyond your contract period
Never operate without full transparency with regulators
INFORMATION SECURITY

YOUR DATA,
LOCKED DOWN.

Trust starts with security. We implement industry-standard cybersecurity frameworks to protect every piece of data under our care. Your facial data is encrypted end-to-end, accessible only to authorized systems, and audited continuously.

  • AES-256 encryption for all data in transit and at rest
  • Role-based access controls and regular audits
  • ISO 27001 certified information security management
  • Cyber Essentials Plus certified
  • 99.99% uptime with redundant infrastructure
Encryption
AES-256
Uptime
99.99%
Certification
ISO 27001
Cyber Essentials
PLUS
BEFORE YOU DEPLOY

WE GUIDE YOU
THROUGH EVERY STEP.

A Data Protection Impact Assessment is required before deploying facial recognition in most scenarios under UK GDPR. We don't just comply — we help you understand every step and make informed decisions about your deployment.

1

Determine if DPIA is Required

We assess your specific use case. Does your deployment involve biometric processing? Are you monitoring public spaces? We walk through ICO guidance and help you decide if DPIA is required.

2

Map Your Data Flows

We help you document exactly how facial data will be captured, stored, processed, and who has access. This clarity is essential for GDPR compliance and reduces deployment risks.

3

Identify & Mitigate Risks

Together we identify potential privacy risks: false positives, data breaches, unauthorized access, retention errors. For each risk, we design technical and organizational safeguards.

4

Document & Review

We help you document everything in a DPIA template. This becomes your evidence of compliance. If regulators ask questions later, you have a clear record showing you thought this through.

5

Approval & Deployment

Once your DPIA is complete and risks are mitigated, you have confidence to deploy. And if issues arise after launch, your documented process makes it easier to adapt and stay compliant.

READY TO DEPLOY THE RIGHT WAY?