Security & Artificial Intelligence FAQ
Last updated: January 2026
This FAQ explains how the Virtual Business Analyst (VBA) handles security, privacy, data access, and the use of artificial intelligence.
What is the Virtual Business Analyst?
The Virtual Business Analyst (VBA) is an AI-assisted digital consultant designed to help organisations capture, clarify, and structure business information.
It supports activities such as:
stakeholder interviews and structured conversations
requirements and discovery activities
synthesis of themes and insights
drafting of preliminary outputs (e.g. summaries, epics, or user stories)
The VBA supports human consultants and project teams. It does not replace professional judgement, delivery governance, or decision-making.
How is access to the Virtual Business Analyst controlled?
Access to the Virtual Business Analyst is not public.
All users must authenticate using Microsoft Entra ID (formerly Azure Active Directory)
Only explicitly authorised users (whitelisted by Joist Consulting or the client) can access the tool
Anonymous or unauthenticated access is not permitted
This ensures that only approved individuals can interact with the assistant.
How is my information used?
Information provided to the Virtual Business Analyst is used solely to:
facilitate structured conversations
generate draft summaries and insights
support project discovery, analysis, and documentation
Conversation outputs are treated as working material and are reviewed and validated by the project delivery team before being relied upon.
Is my data used to train AI models?
No.
Your data is not used to train public or shared AI models
Conversation content remains within the configured project environment
Client data is not incorporated into future model training or reused across engagements
Where is my data stored?
Data is stored only within the configured project environment and associated approved systems (such as secure cloud services used for transcripts or summaries).
Storage locations are selected to align with:
client contractual requirements
applicable data residency expectations
industry-standard security controls
No data is stored on personal devices.
Who can access the information?
Access is restricted to:
authorised Joist Consulting project team members
approved client representatives (where agreed)
Access is enforced using:
identity-based authentication
role-based permissions
environment-level segregation between clients and projects
How is security handled?
The Virtual Business Analyst is designed using defence-in-depth security principles, including:
strong identity-based authentication (Microsoft Entra ID)
encrypted data in transit and at rest where available
segregation of client and project environments
restricted network access via browser-level security controls
logging and monitoring for operational oversight
The web application enforces a Content Security Policy (CSP) that limits scripts and network connections to approved Microsoft and platform endpoints only.
Security configurations align with modern enterprise SaaS practices.
Is the AI making decisions on behalf of the business?
No.
The Virtual Business Analyst:
does not make autonomous business decisions
does not execute transactions
does not approve, reject, or enforce outcomes
It generates draft insights and suggestions only, which must be reviewed and approved by humans.
How accurate are the outputs?
AI-generated outputs:
reflect the information provided by users
may contain assumptions, gaps, or ambiguities
are intended as starting points, not final artefacts
Human review is required before outputs are used for delivery, decision-making, or governance purposes.
Can the Virtual Business Analyst access my internal systems?
No, unless explicitly configured and approved.
By default, the Virtual Business Analyst:
does not connect to ERP, finance, HR, or operational systems
does not have live access to internal databases
does not retrieve data from client systems
Any integrations are optional, tightly controlled, and agreed in advance.
What happens at the end of a conversation?
When a conversation concludes:
a structured summary may be presented for review
users may refine or confirm the captured information
confirmed summaries can be securely stored as project artefacts
This ensures transparency and accuracy before information is retained.
Is this compliant with privacy and confidentiality obligations?
The Virtual Business Analyst is designed to support compliance with:
confidentiality obligations in consulting engagements
applicable privacy principles and data-handling expectations
Clients remain in control of what information is shared, reviewed, and retained.
Can sensitive information be excluded?
Yes.
Users are encouraged not to provide:
passwords or credentials
personal health information
highly sensitive or regulated personal data
The Virtual Business Analyst is not intended for handling regulated personal data unless explicitly agreed and configured.
Who owns the outputs?
Unless otherwise agreed contractually:
the client owns the project-specific outputs
draft materials remain subject to review and validation
The AI does not claim ownership of generated content.
What if we have additional security questions?
We welcome security and IT due-diligence discussions.
Please contact us to:
review the security architecture at a high level
discuss data handling, retention, and access controls
align with your organisation’s risk, compliance, and assurance standards
