Security Policy
This policy is effective as of November 1, 2024 and last updated on November 1, 2024
At LegalSpark.AI, we prioritize the security and privacy of our users' data. We are committed to implementing robust security measures to protect your information while using our platform.
1. Data Ownership and Control
LegalSpark.AI is designed to empower you with control over your data, ensuring that you retain ownership and authority.
2. Technology Overview
Our platform offers AI-driven marketing solutions tailored for solo lawyers and small law firms. We utilize modern programming languages, frameworks, and orchestration platforms, hosting our services on secure data centers operated by industry-leading providers. We minimize personal data processing and maintain GDPR-compliant Data Processing Agreements and Privacy Policies.
3. Data Encryption
We employ robust security features to protect your data:
- In Transit: All data transferred between your device and our servers is encrypted using Transport Layer Security (TLS) technology, ensuring secure communication.
- At Rest: We use encryption protocols to secure data stored on our servers, providing a high level of security for your information.
4. Application Security
LegalSpark.AI utilizes passwordless authentication methods to enhance security and streamline the user experience:
- Google Login: Secure access through your Google account, leveraging Google's robust security infrastructure.
- Email Magic Link Login: Receive a unique, time-sensitive magic link sent directly to your registered email address, allowing secure access without traditional passwords.
We also employ advanced encryption for all customer data in transit (TLS 1.2+) and at rest (AES with 256-bit keys).
5. Development Practices
Our development process includes:
- Agile Methodologies: Facilitating adaptive planning and continuous improvement.
- Continuous Integration (CI) and Continuous Deployment (CD): Ensuring rapid and reliable software updates.
- OWASP Top 10 Awareness: Integrating security best practices into our software development culture.
- Version Control and Peer Review: Maintaining code and configurations in a version control system, requiring peer review and approval before deployment.
- Automated Code Security Analysis: Utilizing tools as part of our CI process to identify and address potential vulnerabilities.
6. Vulnerability and Incident Management
We continuously evaluate vulnerabilities in operating system packages and software libraries used in our applications. Our measures include:
- Automated Patching: Applying updates where possible to address known vulnerabilities.
- Intrusion Detection System: Identifying and alerting us to any abnormal activities.
7. Security Measures
Our development team is committed to:
- Internal Code Reviews: Ensuring high-quality, secure code.
- Continuous Monitoring and Updates: Addressing potential vulnerabilities and security risks promptly.
- Industry Best Practices: Following standards for software development and infrastructure security.
8. Continuous Improvement
We actively seek feedback from users, security experts, and partners to identify areas for improvement and implement enhancements to our security practices.
9. Contact Us
If you have any questions, concerns, or suggestions about our security practices, please contact us at contact@legalspark.ai.
By using Legal Spark AI, you acknowledge that you have read and understood this Security Policy and agree to its terms.