top of page
Search
All Posts


Bring Your Own AI - The Risks for Data Protection
It’s becoming common to see employees using their own AI tools at work; like a comms officer who drafts with ChatGPT, a finance manager who automates reconciliation through a plug-in, a policy lead who runs data through an “AI summariser” to save time. Small, pragmatic innovations emerge as people find ways to work within systems that often struggle to keep pace with real-world demands. For Data Protection Officers, this “Bring Your Own AI” trend is both inevitable and risky.
Oct 22, 20253 min read


Locums and 'Bring your own Tech'
Across the NHS and wider health sector, locums and temporary clinicians are often essential to keeping services running. They move between organisations, adapt quickly, and bring a wealth of experience. But increasingly, my customers tell me, they’re also bringing their own technology. That might mean the familiar dictation software they use in their main practice, a personal transcription app, or even an AI-powered scribe that listens, writes, and structures their notes. Whi
Oct 22, 20253 min read


Why Simple Fixes for Missing Data Can Create Big Problems in AI
When building AI systems, missing data is unavoidable. Maybe patients didn’t report their income, maybe students skipped a survey, maybe a sensor failed. To keep things moving, developers often use quick fixes like mean imputation , replacing missing values with the average of what’s there. It sounds harmless. But in practice, it can quietly introduce bias, reduce accuracy, and create unfair outcomes. What is imputation? Imputation is the process of filling in missing values
Oct 14, 20252 min read


The Opportunities, Red Flags and Reality of AI in Primary Care
AI in primary care is no longer optional. It is already being built into the systems GP surgeries are expected to use daily. And when...
Oct 10, 20253 min read


Stop Guessing! The Security Health Check That Saves Your Bacon (and Budget)
You know that feeling when you think you've finally got a handle on your cyber security ? You’ve got the shiny firewall, passwords that...
Oct 7, 20254 min read


The Weight of the Watching
It’s weird how being watched has been so normalised. The cameras in the street, the apps on your phone, all feeding invisible systems...
Oct 5, 20253 min read


Who’s Got the Keys?
“It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.” Warren...
Oct 5, 20253 min read


The AI Bubble Burst: What Procurement Needs to Prepare For
AI has been hyped as the solution to almost every challenge, fuelled by a kind of technosolutionism: the belief that technology alone can...
Oct 3, 20253 min read


AI Laundering: Hiding AI in Supplier Pipelines
If AI washing is about suppliers exaggerating their use of artificial intelligence, AI laundering is the opposite problem. It happens...
Sep 30, 20253 min read


AI Washing: How to Spot It in Supplier Claims
If you’ve ever come across “greenwashing” (when companies exaggerate their eco-credentials to appear sustainable) or 'pinkwashing' (when...
Sep 20, 20253 min read


Pilots Need Paperwork Too
When a supplier offers a free pilot or short-term trial, it can feel easier to skip the paperwork. The team wants to test quickly, the...
Sep 19, 20253 min read


Pretexting: what the Wetherspoon case means and what to fix this week
Pretexting (aka “blagging”) is when an attacker invents a believable story and impersonates someone you’d normally trust, police, a...
Sep 13, 20252 min read


AI Washing: The Importance of Checking AI Performance Metrics
From transcription services to decision-support tools, the sales pitch is often confident: “92% accuracy”, “state-of-the-art...
Sep 12, 20253 min read


Getting Referrals Right: Learning from Feedback in Primary Care
Patient feedback can be a great way to expose areas for improvement, particularly when it comes to privacy and human rights. Recently, a...
Sep 9, 20252 min read


When AI Meets Romance Fraud: Why I’m Cautiously Hopeful
I’ve always had an interest in documentaries about fraud, but particularly romance fraud. They’re fascinating and heartbreaking, stories...
Sep 8, 20252 min read


Before, During and After a Data Breach:
Preparing Staff When people think of data breaches, they often picture large-scale cyber-attacks or regulatory investigations. But for...
Sep 1, 20252 min read


Workshop: Compliant AI in Health, Charity and Social Care
We love these opportunities to get together with team members from different organisations, understand AI a bit more, cut through the...
Aug 28, 20251 min read


Gillick Competence in Information Sharing and Record Access
We were recently asked an excellent set of questions following a Subject Access Request (SAR) webinar where the consent of children and...
Aug 26, 20253 min read


Managing Covert Recording in GP Practices
During COVID we saw an uptick in patients covertly recording consultations, some driven by activism and content-making, many by simple...
Aug 26, 20253 min read


Is Achieving ISO 27001 Difficult?
Wondering if achieving ISO 27001 is difficult? Discover what really makes the process challenging, how to avoid common pitfalls, and practical tips to make certification smoother for your organisation.
Aug 19, 20252 min read
bottom of page