Skip to main content

GDPR & Security

How AIM protects personal data

Updated over 7 months ago

The AIM Platform is a centralised, cloud-based solution designed to simplify how organisations capture, store, and interact with asset data. Whether it’s visual records, digital twins, drone outputs, or document sets, AIM provides a secure, structured environment to manage property intelligence at scale.

The platform brings together:

  • AIM Visualise 360: High-resolution panoramic imagery, generated into a 3D Twin

  • AIM Digitise 360: Accurate, measurable digital twins (2D and 3D)

  • Drone Data: Aerial imagery and orthomosaics from aerial surveys

  • Document Storage: Organised by site within a consistent folder structure, tailored to your needs.

All data is stored and processed in compliance with industry standards and UK GDPR regulations.


GDPR & Privacy Compliance

Privacy is a core priority in how AIM handles photographic and spatial data. Here’s how we protect both personal data and organisational security:

Privacy Blurring (Faces & People)

  • AIM uses automated face detection and blurring on all 360° imagery to protect individual identities.

  • This blurring technology is AI-powered and improves over time — however, it is not 100% accurate.

  • To address this, AIM offers:

    • A manual blurring tool that allows users to blur faces or private areas retrospectively

    • The ability to delete images entirely if required

We recommend reviewing imagery before making it accessible to third parties to ensure compliance with privacy expectations.

User Security

  • All platform user passwords are encrypted using industry-standard hashing algorithms.

  • Multi-Factor Authentication (MFA) is enforced to prevent unauthorised account access.

  • Account access is segmented by role and organisation, meaning users can only view data they’re explicitly authorised to access.

Data Hosting & Storage

  • All files are stored in Amazon S3 (London Region) using object-based storage.

  • This separation ensures:

    • Isolated environments between AIM’s core platform and uploaded files

    • Reduced risk of malware or direct web-facing exploits

  • All data is subject to UK & EU GDPR regulations due to being hosted within the UK.

Firewall Protection

  • AIM's servers are protected by:

    • A software firewall (Linux-based) that limits open ports to HTTP/HTTPS only

    • Automated threat detection that blocks suspicious IPs or hostnames

    • Hardware firewalls at the infrastructure level to defend against DDoS and other large-scale attacks

Backups & Disaster Recovery

  • Data is backed up three times daily with rolling snapshots retained for 30 days

  • This ensures resilience and full disaster recovery capabilities across all user and system data

Access Control

  • The platform uses a tiered permission system enforced at the data layer:

    • Developer: Internal system access, IP-restricted

    • Administrator: AIM’s internal data management team

    • Organisation Users: Clients and users within a specific organisation

      • Client Super Administrator - Can sit above multiple sub clients

      • Client Administrator - visibility to all client sites

      • Client User - Restricted visibility to only sites allocated

  • All access is organisation-specific, meaning users cannot view other organisation data.

Platform Monitoring & Updates

  • AIM is supported by 24/7 uptime and performance monitoring systems

  • Automated alerts notify the support team in real time of any system instability

  • All infrastructure is configured for automated updates, ensuring security patches are always up to date


Summary: GDPR Commitments

Feature

How AIM Complies

Personal Data Protection

Automated + Manual Blurring Tools

Data Hosting Location

UK-based (Amazon S3 - London Region)

Secure Access

MFA, Role-Based Permissions, Encrypted Data

Ongoing Protection

Daily Backups, Firewalls, Monitoring

User Transparency

Configurable Privacy Tools, Access Logs

AIM remains committed to ensuring the highest standards of security, data integrity, and privacy for all clients, partners, and end users.

Did this answer your question?