Security as a Priority
We combine encryption, redaction, strict access controls, and enterprise-grade auditing to protect your sensitive legal documents — meeting standards recognized across the EU and US.
Redacted
PII removed
Before anything leaves our environment, an on-prem LLM scrubs names, IDs, and addresses. External providers only receive redacted content with synthetic IDs - never personal info.
Redacted
PII removed
Before anything leaves our environment, an on-prem LLM scrubs names, IDs, and addresses. External providers only receive redacted content with synthetic IDs - never personal info.
Redacted
PII removed
Before anything leaves our environment, an on-prem LLM scrubs names, IDs, and addresses. External providers only receive redacted content with synthetic IDs - never personal info.
Encrypted
Cloud storage
Files live in encrypted Google Cloud buckets. Only one service account and a tightly audited admin group can access them - no public links, no shortcuts.
Encrypted
Cloud storage
Files live in encrypted Google Cloud buckets. Only one service account and a tightly audited admin group can access them - no public links, no shortcuts.
Encrypted
Cloud storage
Files live in encrypted Google Cloud buckets. Only one service account and a tightly audited admin group can access them - no public links, no shortcuts.
Controlled
Strict access checks
We use TLS for all file delivery. Clerk authenticates users; Google Cloud confirms tokens. If you’re not authorized, the file doesn’t leave storage.
Controlled
Strict access checks
We use TLS for all file delivery. Clerk authenticates users; Google Cloud confirms tokens. If you’re not authorized, the file doesn’t leave storage.
Controlled
Strict access checks
We use TLS for all file delivery. Clerk authenticates users; Google Cloud confirms tokens. If you’re not authorized, the file doesn’t leave storage.
Hardened
Secure development
Security baked in from the start - threat modeling, PRs, and automated checks happen before every release to catch issues early.
Hardened
Secure development
Security baked in from the start - threat modeling, PRs, and automated checks happen before every release to catch issues early.
Hardened
Secure development
Security baked in from the start - threat modeling, PRs, and automated checks happen before every release to catch issues early.
Audited
Access always logged
All file access is logged and monitored in real time. We keep full audit trails so we can always show who accessed what, and when.
Audited
Access always logged
All file access is logged and monitored in real time. We keep full audit trails so we can always show who accessed what, and when.
Audited
Access always logged
All file access is logged and monitored in real time. We keep full audit trails so we can always show who accessed what, and when.
Private
No AI training
We’ve secured written guarantees from OpenAI and Gemini: your data via their APIs is never used for training or fine-tuning models.
Private
No AI training
We’ve secured written guarantees from OpenAI and Gemini: your data via their APIs is never used for training or fine-tuning models.
Private
No AI training
We’ve secured written guarantees from OpenAI and Gemini: your data via their APIs is never used for training or fine-tuning models.



“Security is our foremost priority, and we rigorously deploy every measure to safeguard our customers.”
Willem Jongert, CEO
Willem Jongert, CEO