Trust & Security

Built on Trust.
Secure by Design.

Law firms trust us with their most sensitive work. We earn that trust through rigorous security practices, a zero-compromise approach to data protection, and full transparency on how your data is stored and processed.

End-to-end encryption

TLS 1.3 in transit, AES-256 at rest. All data encrypted within a SOC 2 compliant cloud environment.

SAML & SSO

Enterprise authentication with single sign-on through your identity provider. Centralised access management for your entire team.

Private by default

Documents stored in private buckets with signed, expiring URLs. AI models never retain or learn from your data.

How We Protect Your Data

Security is not a feature we added — it is the foundation everything is built on. Every layer of our stack is designed to protect your documents and your clients.

Data protection

  • Documents stored in private buckets with signed, expiring URLs
  • AI models never retain or learn from your data
  • All processing is ephemeral — data is not persisted beyond sessions
  • Logical data isolation per tenant

Infrastructure

  • Built on SOC 2 compliant infrastructure via Supabase and AWS
  • Automated backups with point-in-time recovery
  • 24/7 uptime monitoring and incident response
  • Regular vulnerability assessments and penetration testing

Authentication & access

  • SAML SSO integration with your identity provider
  • Role-based access control (RBAC) across all resources
  • Multi-factor authentication (MFA) support
  • Comprehensive audit logging for all access events

Compliance

  • SOC 2 compliant foundation through Supabase and AWS
  • Data processing agreements available on request
  • Configurable data retention policies
  • Incident response plan with defined SLAs

Zero trust architecture

Every request is verified. We apply the principle of least privilege across our entire infrastructure. Backend-only service roles ensure elevated permissions are never exposed to the browser. Row Level Security (RLS) on all database tables limits access by user and role.

Data residency

All data processing runs on SOC 2 compliant infrastructure via Supabase and AWS, with full compliance to local data sovereignty laws. We ensure your data stays where your firm needs it — with complete transparency on hosting locations and data flows.

Partnership

We work with you

Security is a partnership. We work collaboratively with firms to address specific security concerns or compliance requirements — whether it's a custom security review, a DPA, or aligning with your internal policies.

We conduct regular vulnerability assessments and continuously update our processes and systems to adapt to evolving threats and industry standards. Our security posture is never static.

Get in touch

Have security questions?

We're happy to discuss our security architecture or answer questions from your IT and compliance teams.

Get in touch