Security at LawMate
Encryption, per-user isolation, strict RBAC, and exhaustive audit logs—designed for legal workflows.
Architecture & isolation
We use per-user/tenant isolation (including row-level protections) and safe query patterns. Client portal access uses token-scoped, time-boxed links.
Encryption
TLS in transit; strong encryption at rest; key material is access-controlled and rotated.
Identity & access (RBAC, SSO)
Role-based access across the stack. Tokens are scoped, device-bound, and time-boxed. Our OTC SSO bridge exchanges a one-time code from web to desktop/mobile without exposing tokens in the browser.
Audit logging
We log access, signatures, approvals, downloads, and administrative changes with actor, timestamp, IP, and user agent.
Retention & deletion
Operational data retained as necessary to provide the Service; export available during term; upon termination we delete or anonymize per policy, retaining limited security logs where required.
Backups & disaster recovery
Automated backups with point-in-time recovery windows; redundancy for critical components; periodic restore tests; tracked RTO/RPO objectives.
Secure SDLC & vulnerability management
Code review, dependency scanning, container/image scanning, and timely patching. Secrets management follows least-privilege and rotation practices.
Testing & penetration tests
We run periodic internal testing and may commission third-party assessments. Findings are triaged and remediated according to severity SLAs.
Subprocessors
We use vetted providers (e.g., hosting, email, analytics, payments, AI) under appropriate agreements. A current list is available on request and will be notified upon material changes.
Compliance & privacy
Workflows align with ESIGN/UETA for e-signatures; billing supports LEDES/IOLTA conventions. See the Privacy Policy for GDPR/CCPA and DPA/SCC information.
Incident response
Detection via monitoring and alerting; triage, containment, eradication, recovery; post-mortems and corrective actions.
- Detection via monitoring and alerting
- Triage, containment, eradication, recovery
- Post-mortems and corrective actions
Uptime & component health
See real-time availability and incident history.
Need additional documentation (DPA, SOC reports, or security questionnaire)? Reach our security team at support@lawmate.site.