Security and data protection at Libra

We ensure that your data is always safe, making us the most secure Legal AI solution available

Több mint 700 vezető jogi csapat választása

Több mint 700 vezető jogi csapat választása

Több mint 700 vezető jogi csapat választása

Security

Your data, your control. At all times

We guarantee that your data, inputs (prompts) and outputs (completions) are:

Security

Your data, your control. At all times

We guarantee that your data, inputs (prompts) and outputs (completions) are:

NOT used to improve or train any AI Models

NOT used to improve or train any AI Models

NOT available to other customers

NOT available to other customers

NOT available to any entities outside the EU/EEA

NOT available to any entities outside the EU/EEA

NOT used to improve any third party products or services

NOT used to improve any third party products or services

Certified and Compliant

Verified security, built for legal work

Certified and Compliant

Verified security, built for legal work

Certified and Compliant

Verified security, built for legal work

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeting data security.

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeting data security.

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeting data security.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

Infrastructure Security

(2)

Infrastructure Security

(2)

Infrastructure Security

(2)

Capacity management

The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.

Compliant

Compliant

Password policy enforced

The company requires passwords for in-scope system components to be configured according to the company's policy.

Compliant

Compliant

Organizational security

(4)

Organizational security

(4)

Organizational security

(4)

Continuity and Disaster Recovery plans established

The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Compliant

Compliant

Continuity and Disaster Recovery plans tested annually

The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it annually.

Compliant

Compliant

ICT readiness for business continuity

ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.

Compliant

Compliant

Information backup

Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.

Compliant

Compliant

Product security

(3)

Product security

(3)

Product security

(3)

Incident response policies established

The company has security and privacy incident response policies and procedures that are documented and communicated to authorized users.

Compliant

Compliant

Addressing information security within supplier agreements

Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.

Compliant

Compliant

Information security incident management planning and preparation

The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.

Compliant

Compliant

Data & Privacy

(3)

Data & Privacy

(3)

Data & Privacy

(3)

Data transmission encrypted

The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.

Compliant

Compliant

Remote access encrypted enforced

The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.

Compliant

Compliant

Data encryption utilized

The company's datastores housing sensitive customer data are encrypted at rest.

Compliant

Compliant

Internal security procedures

(3)

Internal security procedures

(3)

Internal security procedures

(3)

Resources

The organization shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the information security management system.

Compliant

Compliant

Information security in project management

Information security shall be integrated into project management.

Compliant

Compliant

Privacy impact assessment

The company performs a privacy impact assessment for processing or changes to processing, which represent a high risk to the rights and freedoms of data subjects.

Compliant

Compliant

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

Gyakori kérdések

Gyakori kérdések

Gyakori kérdések

Gyakori kérdések

Milyen adatforrásokat használ a Libra?

Milyen adatforrásokat használ a Libra?

Fel lesznek használva az adataim a mesterséges intelligencia tanítására?

Fel lesznek használva az adataim a mesterséges intelligencia tanítására?

Megfelel a Libra a BRAO előírásainak?

Megfelel a Libra a BRAO előírásainak?

Megfelel a Libra a GDPR előírásainak?

Megfelel a Libra a GDPR előírásainak?

What happens if an uploaded document or website contains misleading instructions?

What happens if an uploaded document or website contains misleading instructions?

Milyen mesterséges intelligenciát használ a Libra?

Milyen mesterséges intelligenciát használ a Libra?

Hol tárolják a felhasználói adatokat?

Hol tárolják a felhasználói adatokat?

Hogyan titkosítják az adataimat?

Hogyan titkosítják az adataimat?

Végeznek külső szervek ellenőrzést vagy tanúsítást?

Végeznek külső szervek ellenőrzést vagy tanúsítást?

laywer-cinmatic-background

Univerzális 

eszköz jogi szakemberek számára

Csatlakozzon a több mint 700 vezető jogi csapathoz, akik a Libra segítségével egyszerűsítik a joggyakorlat minden részét.

Peter Schüller, LL.M.

Director Legal, BIOTRONIK

laywer-cinmatic-background

Univerzális 

eszköz jogi szakemberek számára

Csatlakozzon a több mint 700 vezető jogi csapathoz, akik a Libra segítségével egyszerűsítik a joggyakorlat minden részét.

Peter Schüller, LL.M.

Director Legal, BIOTRONIK

laywer-cinmatic-background

Univerzális 

eszköz jogi szakemberek számára

Csatlakozzon a több mint 700 vezető jogi csapathoz, akik a Libra segítségével egyszerűsítik a joggyakorlat minden részét.

Peter Schüller, LL.M.

Director Legal, BIOTRONIK