Content Disclaimer
1. Purpose of this disclaimer
This Content Disclaimer explains the nature and limitations of the content provided through the pacific.london website, including our Insights articles, cybersecurity self-assessment tool, assessment reports, and follow-up email communications. It should be read alongside our Terms of Use and Privacy Policy.
We publish this disclaimer because transparency about how our content is created, and what it can and cannot do, is fundamental to the trust we ask our clients and readers to place in us.
2. This is not professional advice
The content on this website, including all articles, assessment results, PDF reports, and follow-up emails, is provided for general information and educational purposes only. It does not constitute professional cybersecurity advice, IT consultancy, legal advice, or regulatory compliance guidance. It does not create a consultant-client relationship between you and Pacific Technology Group Ltd.
The information on this website is intended as a starting point for organisations seeking to understand their cybersecurity posture and the broader threat landscape. It is not a substitute for a formal engagement with a qualified professional who can assess your specific circumstances, technical environment, and regulatory obligations.
We strongly recommend that you seek independent professional advice before making decisions about your IT security infrastructure, incident response procedures, or compliance posture based on anything you read on this website.
3. Cybersecurity assessment tool
3.1 What the assessment is
Our cybersecurity self-assessment is an indicative diagnostic tool. It is designed to give organisations a general sense of their security posture across five control domains, based on answers provided by the user. It produces a risk score and high-level recommendations intended as a starting point for internal discussion.
3.2 What the assessment is not
The assessment is not:
- A professional security audit
- A penetration test or vulnerability assessment
- A compliance certification (such as Cyber Essentials, ISO 27001, or SOC 2)
- A formal risk assessment to any recognised framework (such as NIST CSF or ISO 31000)
- A substitute for professional cybersecurity consultancy
3.3 Accuracy depends on your input
The assessment generates results based entirely on information you provide. We do not independently verify your responses. The accuracy, usefulness, and relevance of the output depends directly on the accuracy and completeness of the answers you submit. If the information you provide is incomplete, inaccurate, or does not reflect your organisation's actual practices, the resulting scores and recommendations will not reflect your true risk position.
You are solely responsible for the accuracy of the information you provide to the assessment tool.
3.4 AI-generated recommendations
The recommendations in your assessment report are generated by an artificial intelligence model based on your risk scores. The analysis framework and scoring methodology were designed by PTG's consultants, and PTG takes editorial responsibility for the methodology. However, individual recommendations may contain inaccuracies, generalisations, or suggestions that are not appropriate for your specific technical environment or regulatory context.
You should treat the report as a conversation starter, not as a set of instructions to implement without further evaluation.
4. AI-generated content
4.1 Our AI content taxonomy
We use the following classifications to describe how content on this website is produced:
AI-Generated with Human Editorial Oversight: Content produced primarily by AI systems, reviewed against quality and accuracy thresholds before publication. PTG assumes editorial responsibility. This applies to our Insights articles and assessment report recommendations.
AI-Generated: Content produced by AI systems with minimal individual human review at the point of creation. PTG has designed the methodology and prompts. This applies to personalised follow-up emails and social media posts.
AI-Generated Imagery: Illustrations created by AI image generation tools. These images do not depict real people, real places, or real events. They are provided for visual context only.
4.2 Limitations of AI-generated content
AI language models, including the models we use, have known limitations:
- They can produce statements that appear authoritative but are factually incorrect (sometimes called "hallucinations").
- They may reference outdated information, superseded advisories, or deprecated technical standards.
- They may generate recommendations that are technically valid in general but inappropriate for your specific environment, industry, or regulatory context.
- They do not have real-time access to the current threat landscape at the moment you read the content.
Our automated editorial review process is designed to catch material errors in factual accuracy, regulatory references, and technical recommendations. However, no automated review system is infallible.
For a detailed explanation of our AI practices, see our AI Transparency Statement.
5. Blog and Insights articles
Our Insights section publishes cybersecurity intelligence articles generated from verified RSS feeds, government advisories, vendor security bulletins, and regulatory publications. Articles are published frequently and cover emerging threats, regulatory developments, and operational security guidance.
These articles are general commentary. They are not tailored to any individual organisation's circumstances. An article discussing a specific vulnerability, threat actor, or regulatory requirement should not be taken as advice that the issue described affects your organisation, or that the remediation steps described are appropriate for your environment without your own assessment.
Publication dates are displayed on each article. Cybersecurity information can become outdated rapidly. We do not systematically review previously published articles for continued accuracy. If you are relying on information from an article published more than 30 days ago, we recommend verifying it against current sources.
6. Follow-up emails
If you consent to receive our follow-up email series after completing the assessment, you will receive up to five emails over approximately 14 days. These emails are generated by AI and personalised to the risk areas identified in your assessment.
The email content is generated at the time of sending and reflects the AI model's output based on your risk profile. The same limitations described in Section 4.2 apply. The emails may reference PTG articles or general cybersecurity resources. They are not a substitute for professional advice and do not constitute a consultancy engagement.
Each email includes a footer disclosing that the content was personalised using AI based on your assessment results.
7. No guarantee of security outcomes
No information, tool, checklist, framework, or guidance provided through this website can guarantee protection against cyber attacks, data breaches, ransomware, or any other security incident. The cybersecurity threat landscape involves inherently unpredictable risks, including zero-day vulnerabilities and advanced persistent threats that, by definition, cannot be anticipated by general guidance.
PTG disclaims all liability for any security incidents, data losses, regulatory penalties, operational disruptions, or financial losses suffered by any organisation that has used the assessment tool, read our articles, or implemented guidance found on this website. This exclusion applies regardless of whether PTG was aware of the possibility of such loss.
This does not affect any liability that cannot be excluded or limited under the laws of England and Wales. See our Terms of Use for the full limitation of liability provisions.
8. Regulated sectors
Our content and assessment tool are designed for general business use. They do not assess compliance with sector-specific regulatory requirements, including but not limited to those of:
- The Financial Conduct Authority (FCA) and Prudential Regulation Authority (PRA)
- The Solicitors Regulation Authority (SRA)
- The Care Quality Commission (CQC)
- The Office for Students (OfS) and Ofsted
- NHS Digital and the Data Security and Protection Toolkit (DSPT)
- The Telecommunications (Security) Act 2021 requirements
Organisations operating in regulated sectors should supplement any general guidance from this website with advice from professionals with specific expertise in their regulatory framework.
9. Questions
If you have questions about this disclaimer, the nature of our content, or how our AI systems operate, contact us at hello@pacific.london.
Pacific Technology Group Ltd
167-169 Great Portland Street, 5th Floor
London W1W 5PF
Phone: 0203 137 6707
