Blueprints
Define and customize your organization's policies and protocols with Blueprints. Set nuanced rules, thresholds, and guidelines to align interactions with your unique requirements.
Protocols
Specify the number of protocols or rules within each Blueprint to ensure comprehensive coverage of your compliance and ethical standards.
Templates
Access pre-built Blueprints for common compliance areas, or use them as a starting point to create customized Protocols tailored to your Organization.
Collaborate
Manage multiple Blueprints to address different areas of your organization and different priority timeframes.
Test mode
Test and simulate your Blueprints in a safe environment before deploying them globally, ensuring accuracy and identifying potential issues.
Interaction Patterns
Protocols are based on a set of categories to cover the key aspects of a liability management - defensible Policies, proactive decision guidance, best practice promotion, performance tracking, and continuous learning/improvement.
Custom Policies Access
Policy is a foundational protocol type capturing your organizational policies, regulations and compliance mandates that must be adhered to in order to mitigate liabilities.
Analytics
Gain valuable insights into potential flags, breaches, risk areas, and anonymised employee interactions through comprehensive analytics and reporting.
Quick View Upcoming
A set of individual statistics that provide a quick overview of your members' engagement, interactions and interest levels across different areas of the application.
Engagement
Monitor and analyse employee engagement levels with your organization's policies and compliance initiatives.
Trends
Visualise Log trends over time.
Flags
Receive real-time notifications or "flags" when EVA detects potential issues or deviations from your defined policies, enabling proactive intervention.
Users Roles
Global Admin
GAs Have full permissions to manage all features including creating, editing, archiving, publishing, deleting Blueprints, managing billing, accessing the Library, accessing analytics, and managing members across all roles.
Member
Has a view-only role for Published Blueprint with potential to add comments or feedback, stay aware of guidelines and can view the Organisation's members list.
EVA AI
Go in depth and interact naturally with EVA.
Interactive Updates
Stay up-to-date with the latest insight. EVA will update you on trends and help you improve oversight monitoring base don your priorities.
Blueprint Generation
Let EVA Generate a Blueprint based on a few instructions.
Blueprints
Define and customize your organization's policies and protocols with Blueprints. Set nuanced rules, thresholds, and guidelines to align interactions with your unique requirements.
Protocols
Specify the number of protocols or rules within each Blueprint to ensure comprehensive coverage of your compliance and ethical standards.
Templates
Access pre-built Blueprints for common compliance areas, or use them as a starting point to create customized Protocols tailored to your Organization.
Collaborate
Manage multiple Blueprints to address different areas of your organization and different priority timeframes.
Test mode
Test and simulate your Blueprints in a safe environment before deploying them globally, ensuring accuracy and identifying potential issues.
Snapshots
Capture snapshots of your Blueprints at specific points in time, enabling version control and allowing you to revert to previous configurations if needed and match logs occurrence.
Patterns Seeker
Protocols are based on a set of categories to cover the key aspects of a liability management - defensible Policies, proactive decision guidance, best practice promotion, performance tracking, and continuous learning/improvement
Custom Policies Access
Policy is a foundational protocol type capturing your organizational policies, regulations and compliance mandates that must be adhered to in order to mitigate liabilities.
Â
North Star Alignment Upcoming
Your selected members facing daily interaction will be able to pick a specific type of Protocol linked to their Phantom's NS-A* guiding them accordingly.
Protocols Categories:
Â
Customizable Alerting
and Escalation
Tailor alert and escalation procedures based on the severity or context of policy violations, ensuring that the right stakeholders are notified and appropriate actions are taken.
Analytics
Gain valuable insights into potential flags, breaches, risk areas, and anonymised employee interactions through comprehensive analytics and reporting.
Quick View Upcoming
A set of individual statistics that provide a quick overview of your members' engagement, interactions and interest levels across different areas of the application.Engagement
Monitor and analyse employee engagement levels with your organization's policies and compliance initiatives.
Trends
Visualise Log trends over time.
Flags
Receive real-time notifications or "flags" when EVA detects potential issues or deviations from your defined policies, enabling proactive intervention.
Logs Export
Protocol Insights Upcoming
Â
Provides in-depth insights into the performance and effectiveness of individual Protocols.
NAVI
Track and monitor generalised web browsing activities and domain access, helping you identify potential risks, security threats, or policy violations related to internet usage.
Customizable Alerting
and Escalation
Tailor alert and escalation procedures based on the severity or context of policy violations, ensuring that the right stakeholders are notified and appropriate actions are taken.
Global Admin
GAs Have full permissions to manage all features including creating, editing, archiving, publishing, deleting Blueprints, managing billing, accessing the Library, accessing analytics, and managing members across all roles.Member
Has a view-only role for Published Blueprint with potential to add comments or feedback, stay aware of guidelines and can view the Organisation's members list.
Steward
Create, edit, archive, publish, delete Blueprints, access the Library for duplication and deletion, view analytics, and invite/upgrade members to Architect and Member roles.
Architect
A crucial role that can edit Blueprints in draft mode, access the Library to create and edit their own Blueprints and those they're invited to, invite members to collaborate on their protocols, and view analytics.
Treasurer
The Treasurer role is dedicated to managing billing and subscriptions for the organization.
EVA AI
Go in depth and interact naturally with EVA.
Interactive Updates
Stay up-to-date with the latest insight. EVA will update you on trends and help you improve oversight monitoring base don your priorities.
Blueprint Generation
Let EVA Generate a Blueprint based on a few instructions.
Blueprints
Define and customize your organization's policies and protocols with Blueprints. Set nuanced rules, thresholds, and guidelines to align interactions with your unique requirements.
Protocols
Specify the number of protocols or rules within each Blueprint to ensure comprehensive coverage of your compliance and ethical standards.
Templates
Access pre-built Blueprints for common compliance areas, or use them as a starting point to create customized Protocols tailored to your Organization.
Collaborate
Manage multiple Blueprints to address different areas of your organization and different priority timeframes.
Test mode
Test and simulate your Blueprints in a safe environment before deploying them globally, ensuring accuracy and identifying potential issues.
Snapshots
Capture snapshots of your Blueprints at specific points in time, enabling version control and allowing you to revert to previous configurations if needed and match logs occurrence.
Patterns Seeker
Protocols are based on a set of categories to cover the key aspects of a liability management - defensible Policies, proactive decision guidance, best practice promotion, performance tracking, and continuous learning/improvement.
Custom Policies Access
Policy is a foundational protocol type capturing your organizational policies, regulations and compliance mandates that must be adhered to in order to mitigate liabilities.
North Star Alignment Upcoming
Your selected members facing daily interaction will be able to pick a specific type of Protocol linked to their Phantom's NS-A* guiding them accordingly.
Protocols Categories:
Analytics
Gain valuable insights into potential flags, breaches, risk areas, and anonymised employee interactions through comprehensive analytics and reporting.
Quick View Upcoming
A set of individual statistics that provide a quick overview of your members' engagement, interactions and interest levels across different areas of the application.
Engagement
Monitor and analyse employee engagement levels with your organization's policies and compliance initiatives.
Trends
Visualise Log trends over time.
Flags
Receive real-time notifications or "flags" when EVA detects potential issues or deviations from your defined policies, enabling proactive intervention.
Triggers
Making sure to differentiate what was written, and what was sent.
Logs Export
Export detailed logs and analytics in CSV, for further analysis, auditing, or integration with other systems.
Protocol Insights Upcoming
Provides in-depth insights into the performance and effectiveness of individual Protocols.
Navi
Track and monitor generalised web browsing activities and domain access, helping you identify potential risks, security threats, or policy violations related to internet usage.
Customizable Alerting and Escalation
Tailor alert and escalation procedures based on the severity or context of policy violations, ensuring that the right stakeholders are notified and appropriate actions are taken.
Global Admin
GAs Have full permissions to manage all features including creating, editing, archiving, publishing, deleting Blueprints, managing billing, accessing the Library, accessing analytics, and managing members across all roles.
Member
Has a view-only role for Published Blueprint with potential to add comments or feedback, stay aware of guidelines and can view the Organisation's members list.
Steward
Create, edit, archive, publish, delete Blueprints, access the Library for duplication and deletion, view analytics, and invite/upgrade members to Architect and Member roles.
Architect
A crucial role that can edit Blueprints in draft mode, access the Library to create and edit their own Blueprints and those they're invited to, invite members to collaborate on their protocols, and view analytics.
Treasurer
The Treasurer role is dedicated to managing billing and subscriptions for the organization.
blankstate prioritizes employee privacy by never storing any sensitive or conversational data. We encrypt any necessary information securely, and our federated approach keeps all private details on the user’s device, preventing unauthorized access.
The core principle of our solution is federated processing. Main calculations and data processing occur locally, while any data required on our platform is encrypted for maximum security.
No, we do not use any external AI APIs. We have our own proprietary technology and do not send data to third-party services, ensuring complete data privacy and security.
Absolutely. You can visit our dedicated privacy page or contact fair@blankstate.ai to request comprehensive information about our robust data encryption practices and access control protocols.
We prioritize compliance with data privacy regulations through external audits, adherence to relevant ISO standards, and minimizing data collection to only what is strictly necessary for maintaining user privacy and regulatory integrity.
Our solution allows you to create virtually any type of policy or guideline using natural language input. While we provide helpful templates to get started, the possibilities are limitless, subject to privacy and regulatory safeguards.
Our proprietary Phantom extension accompanies users during their interactions, ensuring data stays secure and preventing unintentional liability. Phantom communicates with our EVA platform, which hosts your policies and protocols, to detect potential violations and flag areas of concern with a breach level from 0 to 100, without compromising user anonymity.
Managers can access real-time trends and export raw data for comprehensive analytics using tools like Power BI, R, or Excel. This provides a pulse check on organizational health based on your defined targets.
Yes, EVA understands natural language inputs, allowing you to create and refine customized policies tailored to your organization’s unique needs before publishing them.
Implementation is straightforward and requires no IT involvement. Managers create an organization on our platform and define rules for EVA. Employees are then invited to sign up, download the Phantom extension, and associate it with the organization. The entire process is quick and seamless.
Our intuitive onboarding process typically eliminates the need for extensive training. However, our support team is available at support@blankstate.ai to assist with any questions or guidance needed, especially for creating initial protocols.
Currently, our solution operates as a standalone platform to maintain data control and security. If you have an existing ecosystem you’d like to integrate with our solution, please contact us to explore potential integration options.
Absolutely. Our tiered pricing model supports scaling automatically up to 500 members per organization. To maintain anonymity and engagement principles, a minimum of 10 members is required. If your organization exceeds 500 members, please contact us for tailored solutions.
71-75 Shelton Street, Covent Garden, WC2H 9JQ London, United Kingdom
©  Traceflow ltd. All rights reserved.