We ensure that your data is always safe, making us the most secure Legal AI solution available
Security
Your data, your control. At all times
We guarantee that your data, inputs (prompts) and outputs (completions) are:
Capacity management
The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.
Compliant
Password policy enforced
The company requires passwords for in-scope system components to be configured according to the company's policy.
Compliant
Continuity and Disaster Recovery plans established
The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.
Compliant
Continuity and Disaster Recovery plans tested annually
The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it annually.
Compliant
ICT readiness for business continuity
ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.
Compliant
Information backup
Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.
Compliant
Incident response policies established
The company has security and privacy incident response policies and procedures that are documented and communicated to authorized users.
Compliant
Addressing information security within supplier agreements
Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.
Compliant
Information security incident management planning and preparation
The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.
Compliant
Data transmission encrypted
The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.
Compliant
Remote access encrypted enforced
The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.
Compliant
Data encryption utilized
The company's datastores housing sensitive customer data are encrypted at rest.
Compliant
Resources
The organization shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the information security management system.
Compliant
Information security in project management
Information security shall be integrated into project management.
Compliant
Privacy impact assessment
The company performs a privacy impact assessment for processing or changes to processing, which represent a high risk to the rights and freedoms of data subjects.
Compliant



