Oops! Sorry!!


This site doesn't support Internet Explorer. Please use a modern browser like Chrome, Firefox or Edge.

Start with a Protocol – 100mph Authority OS

⚠️ Price increase pending. Deploy your 100mph AI Protocol now, to lock in current rates!

💡 Controlled enquiry infrastructure for recruitment firms

Start with controlOwn the system

For owner-led and director-led recruitment firms across the West Midlands, install a controlled Authority OS Protocol with clear boundaries, permissions, and oversight — so enquiries, mandates, referral signals, dormant account triggers, candidate follow-up, and internal handovers stay consistent.Installation comes first.Operation is optional after ownership — no hidden retainers, no forced monthly commitments. Once your authority infrastructure is installed, optional support tiers are available to operate, optimise, and amplify the system.

Compare Protocol Options

✓ Enquiry control • ✓ Decision boundaries • ✓ Continuity layer • We don’t allow AI to execute sensitive actions unseen. Where risk warrants it, actions are approval-gated so you can review the exact parameters before anything runs.

Where mandate flow becomes inconsistent

Many recruitment firms are still running on fragmented desk processes — which means delayed responses to opportunity signals, inconsistent client handling, weak referral follow-through, and avoidable pressure on consultants.

Without governance

  • Consultant time is consumed by repetitive admin that should be handled more consistently
  • Missed enquiries caused by delayed response handling, weak handovers, and fragmented desk ownership
  • Small data entry errors creating expensive knock-on problems across candidate, client, and mandate records
  • Working late just to stay on top of updates, follow-up, referral signals, dormant accounts, and chasing information

What leaders feel

  • Not sure which enquiry, mandate, or candidate-handling process to tighten first
  • Unclear what your current recruitment systems can and can’t support safely
  • Unsure what “good” looks like — and what it will realistically take without disrupting desks
  • Worry about continuity, dropped handovers, founder dependency, and losing control of commercial decisions and data

With controlled rollout

  • Reduce repetitive admin with clear guardrails, permissions, and approvals
  • Improve response consistency for enquiries, mandates, hiring partners, and candidate handling within defined boundaries
  • Help desks follow repeatable standards without bottlenecking on one founder or senior consultant
  • Recover consultant capacity by cutting rework, duplicated chasing, and unclear handoffs

Typical impact:fewer avoidable errors, less rework, and stronger operating resilience

Outcomes vary by process maturity, system setup, desk discipline, and how consistently standards and oversight are applied.

Bounded, accountable recruitment automation

Designed for recruitment environments where relationships, reputation, commercial timing, and traceable handling carry disproportionate weight.

🧠

Enquiry control

Relieve desk overload with a practical framework — mapping day-to-day friction in opportunity handling, referral progression, dormant account reactivation, candidate follow-up, and client communication, then setting consistent handovers and clear boundaries around “the reliable way we do things.”

Teams typically recover consultant capacity by reducing rework and repeated chasing, with clearer ownership and more predictable handovers.

Rapid Audit

Practical insight for recruitment leaders

£30
Low-friction starting point
/session

See exactly how to protect continuity and reduce desk admin drag with repeatable standards, explainable routing, and clear control.

  • 20-30 minute live working session
  • Example of reduced rework in action, with human review steps for sensitive routing
  • 1-page roadmap for calmer desk operations, clearer ownership, and traceable workflows
Reliability Graph

Continuity layer

Maintain consistency across your agency with practical tools — handling enquiries, routing verified opportunities, managing follow-up, preserving candidate and client context, and reducing avoidable errors that create desk pressure and reputational risk.

Busy recruitment teams often recover capacity through clearer follow-through, fewer dropped handovers, and reduced administrative burden — with role-based boundaries and human oversight where it matters.

As Seen In

Protocol installation

Starter Protocol™

Enquiry discipline

£1,185

Fixed implementation fee

Operational in 14 days with preparedness guarantee

  • 1 Capacity Control Tool (web + messaging triage)
  • 2 Repeatable Standards (enquiry handling + inbound capture)
  • 1 System Connection (CRM, ATS, or core record system)
  • 2 Refinements included for internal confidence
  • Inbound Performance Reports
  • Operational Resilience Guarantee
Deploy Starter Protocol
Protocol installation

Accelerator Protocol™

Consistent responsiveness for growing recruitment teams

£3,500

Fixed implementation fee

Operational in 21 days with preparedness guarantee

  • Multi-Channel Control Tool (web, WhatsApp, social hubs)
  • Enhanced Internal Consistency (fewer dropped handovers)
  • System Integration (routes verified enquiries)
  • Operational Discipline (intake → CRM or ATS record + follow-up steps)
  • Stakeholder Insights Dashboard for clear oversight
  • 4 Refinements included
  • Operational Resilience Guarantee
Deploy Accelerator Protocol
Protocol installation

Custom Protocol™

Controlled rollout for more complex recruitment operations

Tailored Solution

Built to your specific governance and approval requirements

  • Everything in Accelerator Protocol + tailored controls
  • Telephone Protocol (consistent initial triage system)
  • Multi-System Traceability (3+ systems)
  • Enhanced Data Handling (candidate documents and records → internal insights)
  • Dedicated Implementation Specialist (guides your safe delegation rollout)
  • Full Audit Trail for traceable handling
  • Operational Resilience Guarantee
Schedule Your Discovery Session

Protocol comparison

CapabilitiesStarter Protocol™Accelerator Protocol™Custom Protocol™
Capacity Control Tool1 channel4 channelsMulti-channel
Repeatable Standards25 +Tailored
System Connections12 - 33 +
Operational Discipline1 processMultiple
Telephone Protocols-2 - 3Multiple
Data HandlingStandardAdvanced
Internal InsightsStandardEnhancedTailored
Refinements Included24Comprehensive
Implementation GuidanceStandardPriorityDedicated

Link resolution clause: this refactor has permission to add or correct IDs, and only IDs, where required so internal links always resolve, without changing structure, layout, or section order. All internal anchors on this page resolve to unique destination IDs, and no navigable section retains an id="null" placeholder.

URL changes list: https://100mphmedia.co.uk/smb-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/the-audit-page → https://100mphmedia.co.uk/recruitment-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/the-audit-page; /smb-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/starter-protocol → /recruitment-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/starter-protocol; /smb-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/accelerator-protocol → /recruitment-wm-uk/x-smb-wm-uk/edu-uae-sau/edu-wm-uk/smb-wm-uk/events-wm-uk/events-lon-uk/events-nw-uk/accelerator-protocol.

Common questions

What to expect from a Protocol installation.

What do we “own”? +

You own the installed infrastructure: the configured workflows, the defined standards, the bounded permissions, and the traceable handover logic we implement. The system is built so your recruitment team can operate it with clear oversight and predictable behaviour, rather than relying on ad-hoc fixes and guesswork.

Can we expand later? +

Yes. Most agencies begin with a small, governed footprint and expand once internal confidence is established. Expansion means adding more standards, channels, or connections — without changing the principle of bounded automation and human-defined accountability.

What if something breaks? +

The Protocol is deployed with safeguards: defined routing, approval points where needed, and traceability so issues can be diagnosed quickly. The goal is operational continuity — fewer surprises, fewer “mystery failures,” and clearer ownership when something needs attention.

Do you fit our systems? +

We design around standard platforms and common recruitment stacks such as CRM, ATS, forms, messaging, booking tools, shared inboxes, and candidate record systems. If you have something proprietary, the Rapid Audit clarifies what is safely connectable and what should remain manual or approval-gated for control reasons.

How long is install? +

The timeline depends on scope: Starter is designed for fast, low-disruption installation; Accelerator extends control across more channels and processes; Custom aligns to more complex approvals and deeper traceability. Each Protocol includes refinements so your team is confident in day-to-day use.

How is value shown? +

Value is shown through operational discipline: fewer dropped handovers, fewer avoidable errors, more consistent responses, and clearer accountability. The installation is designed to reduce rework and improve service reliability — without making ungoverned decisions on behalf of recruiters.

What about IT teams? +

In-house IT remains the authority for core infrastructure and policy. The Protocol focuses on governed workflow architecture, permissions, and operational standards — designed to complement existing teams with clear boundaries and traceability rather than creating shadow systems.

Why start with audit? +

The Rapid Audit is the lowest-friction way to identify what should be standardised first, where approvals belong, and what “bounded automation” looks like in your recruitment environment. It prevents overreach, protects trust, and gives you a practical roadmap before any installation begins.

What counts as change? +

Protocol refinements cover tuning the installed standards: copy updates, routing adjustments, prompt improvements, and small workflow tightening within the deployed scope. Larger expansions such as new processes, deeper integrations, added telephone routing authority, or multi-step redesigns are scoped as additional Protocol work to preserve governance and structural clarity.

Do you guarantee? +

Each Protocol includes a preparedness guarantee tied to timely onboarding inputs such as access, routing rules, stakeholder decisions, and agreed boundaries. This ensures the installation can be delivered with the intended permissions, approvals, and traceability — the foundation of safe operation.

A practical decision

💭 "I want reliability — without losing control."

That’s exactly the point. The Protocol installs standards, boundaries, and permissions so the system behaves predictably. It’s designed for recruitment environments where trust, continuity, commercial timing, and clarity matter — with human-defined accountability built in.

💭 "What if we’re not ready to deploy?"

Start with the Rapid Audit. You’ll leave with clarity on what to standardise first, where approvals belong, and what should remain manual. The goal is calm, stepwise progress — not disruption.

💭 "I don’t want a forced retainer."

You won’t get one. Protocols install and hand over ownership. If you want ongoing operation later, it remains optional and gated after ownership — framed as client protection and structural discipline, not hidden commitments.

Start with the assessment

Your AI readiness assessment is ready when you are. Get a personalised report in around 10 minutes.

✓ Takes around 10 minutes✓ 100% Free✓ No Credit Card Required