Security
How we protect your data
Zero Data Retention
AI processing with zero data retention. Evidence is processed and returned. Nothing stored, cached, or used for training.
SHA-256 Chain of Custody
Every artifact hashed at capture, timestamped, manifested. Any modification breaks the chain and is immediately visible.
Encrypted at Rest and in Transit
TLS 1.3 for data in transit. AES-256 for data at rest. All evidence storage encrypted.
Multi-Tenant Isolation
Row-level security enforced at the database level. Each firm's data is cryptographically isolated. No cross-tenant access paths exist.
Privilege-Safe by Design
Attorney directs, agents execute, audit trail proves the workflow. Every AI action is logged and attributable.
No Model Training
Your data is never used to train, fine-tune, or improve AI models. Contractually guaranteed. No exceptions.
Frequently Asked Questions
Subprocessors
Third-party services that process data on behalf of your firm.
| Subprocessor | Purpose | Location |
|---|---|---|
| Amazon Web Services | Infrastructure, storage, compute | United States |
| Anthropic | AI evidence analysis (zero data retention) | United States |
| Resend | Transactional email delivery | United States |
| Cloudflare | DNS, DDoS protection, CDN | United States |
Questions about security?
We're happy to walk through our security architecture with your team.
Contact Us
