Security
LawAssistant is built with security at its core. We understand that legal documents require the highest levels of protection.
Data Encryption
At Rest
All data is encrypted using AES-256 encryption. Database encryption keys are managed through a secure key management system.
In Transit
All communications use TLS 1.3 encryption. We enforce HTTPS for all connections.
Compliance Certifications
SOC 2 Type II
Annual third-party audits
GDPR
EU data protection compliant
ISO 27001
Information security management
Infrastructure Security
-
✓
Isolated Infrastructure
Enterprise customers can deploy on dedicated, isolated infrastructure with no shared resources.
-
✓
Multi-Region Availability
Data can be stored in your preferred region to meet data residency requirements.
-
✓
Regular Backups
Automated daily backups with point-in-time recovery capabilities.
-
✓
DDoS Protection
Built-in protection against distributed denial of service attacks.
Access Controls
-
✓
Role-Based Access Control
Granular permissions at document and feature level.
-
✓
SSO/SAML Integration
Enterprise customers can integrate with existing identity providers.
-
✓
Multi-Factor Authentication
Optional MFA for additional account security.
-
✓
Audit Logging
Complete activity logs for compliance and investigation.
AI Security
-
✓
No Training on Your Data
Your documents are never used to train AI models. Your data remains yours.
-
✓
Isolated Processing
AI processing is performed in isolated, ephemeral containers.
-
✓
No Data Retention by AI Providers
We use enterprise AI agreements that prohibit data retention by providers.
Security Contact
If you discover a security vulnerability, please report it responsibly to:
We appreciate responsible disclosure and will work with you to address any issues promptly.