FAQs


1 Will this technology replace Human Resources Teams?

Absolutely not. This technology is designed to empower Human Resources teams, not replace them. It provides clear, evidence-based insights to support decision making around recruitment, vetting, and retention. Human Resources teams remain in full control of the process at every stage, using the technology as a powerful decision-support tool.


2 Will this technology affect Human Rights?

No. The technology fully respects and upholds human rights. It is a non intrusive, voluntary process that focuses on identifying potential risk factors objectively and fairly. All assessments are conducted transparently, with clear consent protocols, ensuring the dignity and rights of every individual are maintained.


3 Will this technology affect UK Employment Rights?

No. The process works within existing UK employment laws and is used to support fair, consistent, and objective decision making. It enhances due diligence without impacting an individual’s employment rights. Any outcomes are assessed alongside broader HR and legal considerations, ensuring compliance and fairness.


4 Is there an issue with GDPR?

No. The process is fully GDPR compliant. All data is processed lawfully, securely, and transparently, in line with UK and EU data protection regulations. No biometric or intrusive personal data is collected during the voice analytics assessment. Data is only used for its intended purpose, stored securely, and handled with the highest levels of confidentiality.


5 Can you use AI Technology in court should you wish to?

While the technology provides highly reliable risk indicators, it is typically used to inform internal decision making, rather than as standalone evidence in court. However, the results can support wider investigations, vetting processes, and legal strategies when combined with other evidence. In regulated environments, it provides defensible, auditable insights that complement existing procedures.


6 How reliable is this technology and what other industries use it?

The Clearspeed voice analytics technology is proven, independently validated, and trusted globally. It is used extensively across government, defence, finance, law enforcement, critical national infrastructure, and within the insurance industry, where accuracy and reliability are paramount. The technology delivers consistently high levels of precision and objectivity, far exceeding traditional screening methods in speed and consistency.


7 Who is present during the Voice Analytics Risk Assessment?

The process is simple, secure, and private. Typically, the individual being assessed completes the voice analytics test remotely or in a controlled environment, with minimal personnel required. This protects privacy and ensures consistency. True North Alliance or approved partners oversee the process to maintain security and integrity.


8 How often should the Insider Threat Risk Assessment be carried out?

Insider Threat Risk Assessments should be conducted once a year. Annual assessments provide organisations with a consistent, reliable view of potential risks, ensuring that any changes in roles, access levels, or organisational structure are fully evaluated. In addition to the annual assessment, we advise carrying out extra assessments during key events such as promotions, role changes, or after any security incidents, to maintain a strong and proactive security posture.


9 How would you know if someone had passed or failed the test?

The technology doesn’t label individuals as “pass” or “fail” in a traditional sense. Instead, it provides a clear, objective risk score that highlights areas that may require further review, this is represented by a red, amber or green risk score. This ensures fairness and accuracy, allowing organisations to take informed, balanced decisions rather than relying on binary outcomes.


10 Does this process negate the need to carry out DBS or NS Vetting

No, the technology complements, rather than replaces existing vetting processes, such as DBS or National Security checks. It provides an additional layer of intelligence and assurance, often filling critical gaps that traditional checks may miss. Used together, they create a strong, multi-layered approach to risk management and insider threat detection.