Security

Security by design,
not by policy.

Trust isn't a feature we bolt on. It's the foundation everything else is built on. From how we handle data to how we build every system.

How your data moves

Every stage is isolated, encrypted, and auditable. Nothing lingers where it shouldn't.

Intake

Encrypted ingestion

All data enters through TLS-encrypted endpoints. Documents are scanned, classified, and tagged before entering the pipeline. No raw data persists in transit buffers.

Processing

Isolated compute

Each claim is processed in a tenant-isolated environment. AI models operate on ephemeral copies. No training data is ever retained from client inputs.

Storage

Encrypted at rest

Data is stored with AES-256 encryption in region-locked infrastructure. Access is governed by role-based policies with mandatory audit trails.

Deletion

Verifiable removal

Configurable retention windows with cryptographic deletion verification. When data is removed, it is removed. No soft deletes, no lingering backups.

Governance controls

The mechanisms that keep data where it belongs and access where it should be.

Access control

Role-based permissions with least-privilege defaults.

Auditability

Every action logged, queryable, and attributable.

Data boundaries

Strict isolation between tenants, matters, and environments.

Admin controls

Centralised configuration for teams and policies.

Retention

Configurable data lifecycle and deletion policies.

Permissions

Fine-grained access at the document, matter, and team level.

We don't ask you to trust us. We give you the controls to verify.

Security questions

Common questions from compliance and security teams.