Skip to main content
SwiftCase
PlatformSwitchboardFeaturesSolutionsCase StudiesFree ToolsPricingAbout
Book a Demo
SwiftCase

Workflow automation for UK service businesses. Created in the UK.

A Livepoint Solution

Platform

  • Platform Overview
  • Workflow Engine
  • Case Management
  • CRM
  • Document Generation
  • Data Model
  • Integrations
  • Analytics

Switchboard

  • Switchboard Overview
  • Voice AI
  • Chat
  • Email
  • SMS
  • WhatsApp

Features

  • All Features
  • High-Volume Operations
  • Multi-Party Collaboration
  • Contract Renewals
  • Compliance & Audit
  • Pricing
  • Case Studies
  • Customers
  • Why SwiftCase

Company

  • About
  • Our Team
  • Adam Sykes
  • Nik Ellis
  • Implementation
  • 30-Day Pilot
  • Operations Pressure Map
  • For Your Role
  • Peer Clusters
  • Engineering
  • Careers
  • Partners
  • Press
  • Research
  • Tech Radar
  • Blog
  • Contact

Resources

  • Use Cases
  • Software
  • ROI Calculator
  • Pressure Diagnostic
  • Pilot Scope Estimator
  • Board Case Builder
  • Free Tools
  • Guides & Templates
  • FAQ
  • Compare
  • Glossary
  • Best Practices
  • Changelog
  • Help Centre

Legal

  • Privacy
  • Terms
  • Cookies
  • Accessibility

Stay in the loop

Cyber Essentials CertifiedGDPR CompliantUK Data CentresISO 27001 Standards

© 2026 SwiftCase. All rights reserved.

Platform

Securityyoucanprove.
Notjustclaim.

Cyber Essentials certified. Security policies meeting ISO 27001 standards. UK data centres only. Your data stays where it should, under your control and protected by real security measures.

Talk to Us About Security
See Platform

Certifications

Credentials that matter.

We don't just say we're secure. We prove it with recognised certifications.

Certified

Cyber Essentials Certified

Government-backed certification for cyber security. Passed, not pending. We meet the baseline for protecting against common cyber attacks.

Compliant

ISO 27001 Standards

Security policies and procedures meeting ISO 27001 standards. The international standard for information security management.

Compliant

GDPR Compliant

Built for UK and EU data protection requirements. Data processing agreements, subject access requests, and right to deletion built in.

Data Protection

How we protect your data.

UK Data Residency

Your data stays in the UK. Not routed through servers abroad. Not stored in jurisdictions with different data laws. UK data centres only.

Encryption at Rest

All data encrypted when stored. AES-256 encryption. Even if someone accessed the physical storage, your data would be unreadable.

Encryption in Transit

TLS 1.2+ for all connections. Your data is encrypted between your browser and our servers. No exceptions.

Role-Based Access

Control who sees what. Granular permissions by role, team, or individual. Users only access what they need.

Audit Logging

154+ event types logged. Every login, every change, every access. Full trail of who did what and when. Exportable for compliance.

API Security

API keys with granular permissions. Rate limiting. IP allowlisting available. Secure integration without exposing your system.

Read more about UK data sovereignty

Access Control

Control who accesses what.

Granular permissions. Multi-factor authentication. IP restrictions. You decide who gets in.

Two-Factor Authentication

Optional 2FA for all users. TOTP-based. Add an extra layer of security to every login.

IP Restrictions

Restrict access by IP address or range. Lock down access to your office network if required.

Session Management

Automatic session timeout. Force logout across devices. See active sessions and revoke access.

Data Isolation

Each customer's data is logically isolated. No cross-tenant data access. Your data is yours alone.

Audit Trail

154+ event types. Full history.

Every action logged. Every change recorded. When auditors ask what happened, you have the answer. Exportable reports for compliance reviews.

User login and logout
Password changes
Permission changes
Record creation and updates
Document generation
Email sends
API calls
Workflow executions
File uploads and downloads
Data exports
Configuration changes
Integration activity
Audit Log
14:32:01
Updated case CLM-2024-001
Sarah M.
14:31:45
Generated settlement_letter.pdf
System
14:30:22
Logged in from 192.168.1.100
Sarah M.
14:28:15
Exported contacts report
James K.
14:25:00
Workflow 'Case Closure' executed
System

Our security commitment.

What we promise you.

No data selling

Your data is yours. We don't sell it, share it, or use it for anything except running your system.

Transparent incidents

If something goes wrong, you'll know. We disclose security incidents promptly and clearly.

Regular testing

Ongoing security assessments. We don't set and forget. We continuously improve.

UK-based support

Security questions answered by real people in the UK. Not outsourced, not scripted.

Data Processing

Where your data lives. Who touches it.

Full transparency on data processing, sub-processors, and data flows. Everything your DPO needs to complete a vendor assessment.

Data Processing Agreement

We provide a comprehensive DPA covering GDPR Article 28 requirements. Includes data processing purposes, categories of data subjects, security measures, and sub-processor obligations.

Available on request before contract signing

Sub-Processors

We use a limited number of sub-processors, all UK or EU-based. Our primary infrastructure runs on UK data centres. We notify customers before adding any new sub-processor.

Current sub-processor list available on request

Data Retention & Deletion

Configurable data retention policies per workflow. Automated deletion schedules. Complete data export in standard formats. Full deletion on contract termination with certificate of destruction.

Retention periods configurable per case type

Data Portability

Export your data at any time in CSV, JSON, or XML formats. No vendor lock-in. Your data is yours and you can take it with you.

Self-service export available in all tiers

Compliance Journey

Continuous improvement, not checkbox compliance.

2024

SOC 2 Type I

Achieved SOC 2 Type I attestation covering security, availability, and confidentiality trust service criteria.

2023

Cyber Essentials Plus

Upgraded to Cyber Essentials Plus with independent vulnerability assessment and penetration testing.

2022

ISO 27001 Alignment

Security policies and procedures aligned to ISO 27001 standards with internal audit programme.

2021

Cyber Essentials

Achieved Cyber Essentials certification, the UK government-backed scheme for cyber security.

2018

GDPR Readiness

Full GDPR compliance programme including DPA templates, DSAR handling, and data protection impact assessments.

Security questionnaire

Need to complete a vendor security assessment? We can provide pre-completed responses to standard security questionnaires including CAIQ, SIG, and bespoke formats.

  • Pre-completed CAIQ responses
  • SIG Lite and SIG Full available
  • Bespoke questionnaire turnaround within 5 business days
  • Penetration test summary available under NDA
  • SOC 2 report available under NDA
Request Security Documentation

Common questions we answer

Where is data stored?
UK data centres only. No data leaves the UK.
Is data encrypted?
AES-256 at rest, TLS 1.2+ in transit.
Do you have a DPA?
Yes, GDPR Article 28 compliant. Available pre-contract.
Penetration testing?
Annual third-party pen tests. Summary available under NDA.
Business continuity?
Automated backups, disaster recovery, 99.9% uptime SLA.

Questions about security?

We're happy to discuss our security measures, provide documentation for your compliance team, or answer specific questions about how we protect your data.

Contact Security Team
Explore Platform