SECURITY & PRIVACY
How we protect your data and maintain the security of your delivery intelligence.
FireBreak is designed with security and data privacy as foundational principles. We understand that our clients entrust us with sensitive project and programme data, and we take that responsibility seriously. This page outlines our approach to protecting your information.
Last updated: March 2026. For specific security questions or to request our detailed security documentation, please contact us.
Each client operates within their own isolated environment. Your data is logically separated from other clients and is not accessible across tenant boundaries.
We implement encryption for data in transit and at rest. All connections to FireBreak use TLS encryption, and stored data is encrypted using industry-standard methods.
Your data is never shared with other clients. We do not aggregate, combine, or expose data across client boundaries for any purpose.
We do not use client data to train our models unless explicitly requested and agreed in writing. Your project data remains yours and is used solely to provide the FireBreak service to you.
FireBreak operates its own secure machine learning infrastructure. Where we utilise third-party LLM services, we maintain agreements that ensure encryption at source and rest, with no use of your data for model training.
Access to client environments is restricted and controlled. We implement role-based access controls and maintain audit logs of system access.
FireBreak connects to your existing project management tools, financial systems, and collaboration platforms to read project data. This typically includes schedule information, budget data, change requests, decisions, and related metadata. We access only the data necessary to calculate your Delivery Confidence Score and related insights.
Data is processed within your isolated tenant environment using our deterministic machine learning models. Processing occurs in real-time or near-real-time depending on your configuration. We use transparent, rules-based algorithms where the same inputs always produce the same outputs.
We retain your data for the duration of your service agreement. Upon termination, we will delete your data in accordance with our data retention policy and any applicable legal requirements. You may request data export or deletion at any time.
We use a limited number of sub-processors for infrastructure and service delivery. All sub-processors are bound by contractual obligations to maintain appropriate security measures and data protection standards. A list of sub-processors is available upon request.
FireBreak is committed to maintaining appropriate security standards and compliance with applicable regulations. We are happy to discuss specific compliance requirements with prospective and existing clients.
For security inquiries, detailed documentation, or to discuss your specific requirements, please get in touch.
This overview describes our general approach to security and privacy. It does not constitute a legal agreement or warranty. Specific terms are governed by your service agreement with FireBreak. For the most current information, please contact us directly.