Security & Privacy

Your legal documents deserve enterprise-grade protection. Here's how we deliver it.

AES-256 Encryption

All data is encrypted at rest and in transit using industry-standard AES-256 encryption. Your documents, database backups, and file storage are all protected. All connections use secure HTTPS.

Per-Tenant Data Isolation

Every organization gets its own completely separate database and dedicated file storage. Your data is physically separated from every other organization. This is not shared database with access filters — it's true isolation.

No AI Training on Your Data

Your documents are never used to train AI models. We use AI for processing your requests only — your data is not retained by AI providers and is not used to improve their models.

SOC 2 Aligned

Our security practices follow SOC 2 principles for security, availability, integrity, confidentiality, and privacy. The architecture is designed to support compliance requirements.

Additional Security Measures

Authentication

Sign-in through enterprise identity providers. Every request requires a valid authenticated session. Unauthenticated requests are rejected immediately.

Role-Based Access Control

Fine-grained permissions control what each user can do. Roles include Admin, Manager, Document Editor, Template Editor, Reviewer, Publisher, and Viewer.

Immutable Audit Trail

Every action is recorded in a tamper-proof audit system stored in your organization's own dedicated log storage. Over 50 action types tracked across documents, sessions, approvals, templates, compliance, and authentication.

Network Protection

Enterprise-grade firewall and threat detection systems block common web attacks and abuse attempts before they reach the application.

Data Export & Portability

Download a complete copy of all your data at any time. Your data belongs to you — take it with you if you ever decide to leave.

Questions About Security?

We're happy to discuss our security practices in detail.