Security and data protection at Libra
We ensure that your data is always safe, making us the most secure Legal AI solution available
Capacity management
The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.
Password policy enforced
The company requires passwords for in-scope system components to be configured according to the company's policy.
Continuity and Disaster Recovery plans established
The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.
Continuity and Disaster Recovery plans tested annually
The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it annually.
ICT readiness for business continuity
ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.
Information backup
Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.
Incident response policies established
The company has security and privacy incident response policies and procedures that are documented and communicated to authorized users.
Addressing information security within supplier agreements
Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.
Information security incident management planning and preparation
The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.
Data transmission encrypted
The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.
Remote access encrypted enforced
The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.
Data encryption utilized
The company's datastores housing sensitive customer data are encrypted at rest.
Resources
The organization shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the information security management system.
Information security in project management
Information security shall be integrated into project management.
Privacy impact assessment
The company performs a privacy impact assessment for processing or changes to processing, which represent a high risk to the rights and freedoms of data subjects.



