Starter protocol package
Operations protocol baseline
Custom-built, controlled automation framework deployed across your website and primary enquiries channel within 21 days — designed for accountability, auditability, and safe operation in education environments (confidentiality, trust, continuity).
Enquiries intelligence database
A secure operational knowledge base that captures approved enquiry patterns, applicant journey steps, internal workflows, and institutional decision paths — improving responsiveness without losing control (Arabic/English communication supported by your defined standards).
Control panel ownership
Complete ownership of your deployed infrastructure, including system credentials, operational documentation, and controlled dashboards — built to support explainability, permissions, and human-led final authority.
Today: £195 Protocol Activation (approx. د.إ975 / ﷼995) • Remaining balance processed after onboarding
— Operations Director, multi-site education group
Activate your foundation
Reservation status
Your deployment window is temporarily reserved and will expire if activation is not completed. Time remaining: 23h 42m 18s
Protocol activation today: £195 (approx. د.إ975 / ﷼995)
This activation fee initiates deployment immediately and unlocks baseline functionality for your enquiries intake and service workflows. Full system access is released after the remaining balance is completed, within your institution’s defined permissions and human judgement structure.
Total deployment value remains £1,185 (approx. د.إ5,900 / ﷼6,050) .
After activation
- Strategic onboarding call with your Education Systems Architect within 24 hours (governance, permissions, and decision boundaries agreed up-front)
- Operations database & enquiries intelligence framework deployed (aligned to your applicant journey: enquiry → application → documents → scheduling → fee handoff → onboarding)
- Starter Protocol™ operational infrastructure installed within 21 days (audit trails, controlled routing, and explainable actions across hand-offs)
Secured by infrastructure grid