Security

How We Safeguard Your Personal Information

We use a two-part key system to keep your digital information—like passwords, logins, and important accounts—safe, private, and accessible only when truly needed.

You Generate a Piece of the Key
You create your part of the key—something only you (or someone you trust, like a Power of Attorney or Solicitor) can access.
It could be a short code, a printed phrase, or a QR code.
Keep it somewhere safe.

Tech Made Simple Creates a Unique Key
We generate a second part of the key that is highly secure.
This key is split into secure parts and stored safely across different locations.

Safe and Secure Vault
Only when both keys are used together can your information be unlocked.
This prevents anyone from accessing your data without your permission.

Legal Continuity—Just in Case
We’ve lodged our key fragments with a trusted law firm—but they have no access to your personal information.
Only you—or someone you’ve formally nominated—can request continuity access in case of an emergency.

In Summary

  • You keep one part of the key. We keep the other, split and secure.
  • We’ve added a legal safeguard—but no one can use it without your approval.
  • Your data stays secure, private, and under your control.