Security and data protection at Libra

Security and data protection at Libra

We ensure that your data is always safe, making us the most secure Legal AI solution available

Trusted By >700 leading legal teams

Trusted By >700 leading legal teams

Trusted By >700 leading legal teams

Security

Your data, your control. At all times

We guarantee that your data, inputs (prompts) and outputs (completions) are:

NOT used to improve or train any AI Models

NOT used to improve or train any AI Models

NOT available to other customers

NOT available to other customers

NOT available to any entities outside the EU/EEA

NOT available to any entities outside the EU/EEA

NOT used to improve any third party products or services

NOT used to improve any third party products or services

Certified and Compliant

Verified security, built for legal work

Certified and Compliant

Verified security, built for legal work

Certified and Compliant

Verified security, built for legal work

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeing data security.

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeing data security.

iso

ISO 27001 Compliant

Libra is ISO 27001 certified, guaranteeing data security.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

gdpr

GDPR Compliant

Libra is hosted on servers located within the European  Economic Area (EEA) and is fully compliant with the GDPR.

Infrastructure Security

Infrastructure Security

Infrastructure Security

Capacity management

The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.

Compliant

Password policy enforced

The company requires passwords for in-scope system components to be configured according to the company's policy.

Compliant

Organizational security

Organizational security

Organizational security

Continuity and Disaster Recovery plans established

The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Compliant

Continuity and Disaster Recovery plans tested annually

The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it annually.

Compliant

ICT readiness for business continuity

ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.

Compliant

Information backup

Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.

Compliant

Product security

Product security

Product security

Incident response policies established

The company has security and privacy incident response policies and procedures that are documented and communicated to authorized users.

Compliant

Addressing information security within supplier agreements

Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.

Compliant

Information security incident management planning and preparation

The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.

Compliant

Data & Privacy

Data & Privacy

Data & Privacy

Data transmission encrypted

The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.

Compliant

Remote access encrypted enforced

The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.

Compliant

Data encryption utilized

The company's datastores housing sensitive customer data are encrypted at rest.

Compliant

Internal security procedures

Internal security procedures

Internal security procedures

Resources

The organization shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the information security management system.

Compliant

Information security in project management

Information security shall be integrated into project management.

Compliant

Privacy impact assessment

The company performs a privacy impact assessment for processing or changes to processing, which represent a high risk to the rights and freedoms of data subjects.

Compliant

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

Terms of Service

Select your country to view the applicable Terms of Service, including confidentiality provisions and the Data Processing Agreement.

FAq's

Frequently asked Questions

FAq's

Frequently asked Questions

What data sources does Libra use?

What data sources does Libra use?

Will my data be used for AI training?

Will my data be used for AI training?

Is Libra GDPR-compliant?

Is Libra GDPR-compliant?

What happens if an uploaded document or website contains misleading instructions?

What happens if an uploaded document or website contains misleading instructions?

Which AI does Libra use?

Which AI does Libra use?

Where is user data stored?

Where is user data stored?

How is my data encrypted?

How is my data encrypted?

Is there an audit or certification by external bodies?

Is there an audit or certification by external bodies?

laywer-cinmatic-background

Swiss Army

Knife for Lawyers

Join 700+ leading legal teams using Libra to streamline every part of legal practice.

Peter Schüller, LL.M.

Director Legal at BIOTRONIK

laywer-cinmatic-background

Swiss Army

Knife for Lawyers

Join 700+ leading legal teams using Libra to streamline every part of legal practice.

Peter Schüller, LL.M.

Director Legal at BIOTRONIK

laywer-cinmatic-background

Swiss Army

Knife for Lawyers

Join 700+ leading legal teams using Libra to streamline every part of legal practice.

Peter Schüller, LL.M.

Director Legal at BIOTRONIK