Skip to main content
Security

Your family’s most sensitive information, protected.

Estate planning involves the most personal data you’ll ever store digitally. Here’s how we protect it.

Encryption

AES-256 encryption, field by field

Every sensitive value is individually encrypted before it reaches the database. Not just the database — every field.

Bank-grade encryption

The same encryption standard used by major UK banks and government systems to protect sensitive data.

Every field protected individually

We don’t just encrypt the database — every sensitive field is encrypted on its own, so a breach of one never exposes another.

Built-in key rotation

If a security key is ever compromised, your data can be re-encrypted without downtime or data loss.

Tamper detection

Every encrypted field is integrity-checked. If even a single bit has been tampered with, we detect it immediately.

What we encrypt

Bank account numbersSort codesCredentials & passwordsNational Insurance numbersCrypto wallet details

What we never store: Seed phrases, full card numbers, or anything we don’t need. If we don’t need it, we don’t keep it.

Access Control

Who can see what, and when

Strict role-based access ensures the right people see only the right information, at the right time.

Secure authentication

Industry-standard authentication with multi-factor verification, passwordless login, and automatic session management built in.

Data isolation

Your data is isolated at the database level. It’s invisible to other users — even if something goes wrong in the application layer.

Role-based access

Three distinct roles: Owner, Executor, and Beneficiary. Executors see only what the owner has explicitly shared — nothing more.

Session management

Automatic session timeouts with idle warnings. No session left open indefinitely — your account locks when you step away.

Rate limiting

Sensitive actions are rate-limited to prevent abuse. Brute-force attacks are stopped before they start.

Executor visibility controls

Executors access your estate data only through a controlled portal. They see exactly what you’ve shared — nothing more, nothing less.

Compliance

UK data, UK laws, UK protection

Your data never leaves the UK. We comply with every regulation that protects it.

UK-hosted infrastructure

All data stored in UK-based data centres. Your estate data stays on UK soil.

GDPR compliant

Full compliance with the UK General Data Protection Regulation. Your rights over your data are protected by law.

Soft-delete architecture

Nothing is permanently lost by accident. Deleted data is soft-deleted first, giving you a safety net.

Regular security audits

Ongoing security reviews and penetration testing to identify and close vulnerabilities before they matter.

No third-party data sharing

We never sell, share, or monetise your data. Your estate information belongs to you and no one else.

Encrypted backups

Database backups are encrypted at rest and in transit. Your data is protected even in disaster recovery scenarios.

Protected Data

What we protect

Every category of your estate data is secured with the same rigorous standards.

Bank details

Account numbers, sort codes, and banking credentials — all field-level encrypted.

Property records

Deeds, valuations, mortgage details, and property documentation stored securely.

Digital credentials

Passwords, PINs, access codes, and digital account details — encrypted individually.

Legal documents

Wills, power of attorney, and legal references linked securely within your estate.

Family relationships

Beneficiary and executor assignments, relationship details, and contact information.

Final wishes

Funeral preferences, personal messages, and legacy instructions — your most private thoughts, protected.

Our Principles

Security by design, not afterthought

1

Encryption by default

Every sensitive field is encrypted individually before it touches the database. There is no "unencrypted mode" — protection is the baseline.

2

Least privilege access

Executors and beneficiaries see only what has been explicitly shared with them. No blanket access, no assumptions, no exceptions.

3

Transparency

A full activity log records every access and every change. You always know who viewed your data, when, and what they saw.

Frequently asked questions

Ready to secure your estate?

Join the Beqst beta and protect your family's most sensitive information. No credit card required.