Security
Security by design,
not by policy.
Trust isn't a feature we bolt on. It's the foundation everything else is built on. From how we handle data to how we build every system.
How your data moves
Every stage is isolated, encrypted, and auditable. Nothing lingers where it shouldn't.
Encrypted ingestion
All data enters through TLS-encrypted endpoints. Documents are scanned, classified, and tagged before entering the pipeline. No raw data persists in transit buffers.
Isolated compute
Each claim is processed in a tenant-isolated environment. AI models operate on ephemeral copies. No training data is ever retained from client inputs.
Encrypted at rest
Data is stored with AES-256 encryption in region-locked infrastructure. Access is governed by role-based policies with mandatory audit trails.
Verifiable removal
Configurable retention windows with cryptographic deletion verification. When data is removed, it is removed. No soft deletes, no lingering backups.
Governance controls
The mechanisms that keep data where it belongs and access where it should be.
Access control
Role-based permissions with least-privilege defaults.
Auditability
Every action logged, queryable, and attributable.
Data boundaries
Strict isolation between tenants, matters, and environments.
Admin controls
Centralised configuration for teams and policies.
Retention
Configurable data lifecycle and deletion policies.
Permissions
Fine-grained access at the document, matter, and team level.
We don't ask you to trust us. We give you the controls to verify.
Security questions
Common questions from compliance and security teams.