← Back to Lexitio

Security Overview

Last updated: April 23, 2026

Lexitio is built for legal professionals who handle sensitive, privileged client information. Every architectural and operational decision is made with the assumption that your data requires the highest level of protection — not because a regulator demands it, but because attorney-client privilege is the foundation of legal practice.

Tenant Data Isolation

Each firm's data is completely separate from every other firm.

Application-level isolation

Every database query is filtered by tenant_id. A query from Firm A cannot return data belonging to Firm B — this is enforced at the ORM layer on every route.

Database-level Row Level Security

PostgreSQL Row Level Security (RLS) policies are applied to all tenant-scoped tables as a second enforcement layer. Even if an application bug skips the ORM filter, the database itself will only return rows for the current tenant.

No shared tables without isolation

No table that contains firm data is shared across tenants without an enforced tenant_id predicate. Cross-tenant data leaks are structurally impossible in normal operation.

Encryption

Data is encrypted in transit and at rest.

Encryption in transit

All connections to Lexitio are protected by TLS 1.2 or higher. Unencrypted HTTP connections are redirected to HTTPS. API connections use TLS with strong cipher suites.

Encryption at rest

All uploaded documents, case files, and evidence are stored in Amazon S3 with server-side AES-256 encryption (SSE-S3). Database volumes are encrypted at the infrastructure level.

Password hashing

Passwords are hashed using bcrypt with per-user salts. We never store plaintext passwords, and password hashes are never transmitted or logged.

Access Control

Who can see and do what is strictly enforced.

Role-Based Access Control (RBAC)

Every user is assigned a role (admin, attorney, paralegal, staff). Permissions are enforced at the API layer on every endpoint — there is no UI-only permission check.

JWT authentication with logout invalidation

Authentication uses signed JWT tokens. Logged-out tokens are stored in a blocklist and rejected on every subsequent request, even before expiry.

API key support

Programmatic access uses API keys (sk-lex_ prefix) with per-key permission scopes. Keys are hashed before storage.

Session and rate limiting

Login attempts are rate-limited. Accounts are locked after repeated failed attempts. Session tokens expire automatically.

Multi-factor authentication

MFA via TOTP (Google Authenticator, Authy) is available for all accounts and strongly recommended for admin users.

Audit Logging

Every sensitive action is recorded with a permanent, tamper-evident trail.

Immutable audit log

Every matter creation, document upload, AI query, user login, permission change, and data export is logged with user_id, tenant_id, timestamp, IP address, and action details.

7-year retention

Audit logs are retained for a minimum of 7 years to support legal and regulatory requirements. Logs are append-only and cannot be deleted or modified.

Firm-accessible logs

Firm administrators can view their own audit log at any time from the Settings dashboard without contacting support.

Infrastructure

Resilient hosting with daily backups and offsite replication.

Managed cloud hosting

Lexitio runs on dedicated cloud infrastructure in the United States. No data is stored in consumer-grade or shared hosting environments.

Daily database backups

PostgreSQL is backed up daily via automated pg_dump. Backups are compressed, encrypted, and shipped to Backblaze B2 (offsite object storage) with 30-day retention.

Backup restore tested

Backup integrity is verified by periodic restore tests. If a backup cannot be restored, we treat it as if no backup exists.

Docker isolation

All services run in isolated Docker containers with no unnecessary network exposure. The database port is not publicly accessible.

AI Processing and Data Use

Your client data is never used to train AI models.

Zero-training commitment

Your matter data, client information, uploaded documents, and AI query content are never used to train any AI model — including any third-party provider we use. We use Anthropic's API under zero-data-retention terms.

Anthropic (Claude)

AI queries are processed via Anthropic's API under their zero-data-retention API agreement. Anthropic is contractually prohibited from using API input/output for model training.

No persistent AI memory

AI conversations are stateless. No chat history is retained on third-party AI infrastructure between sessions.

Prompt isolation

Each AI request is scoped to the current matter's data only. The AI cannot access data from other matters or other firms.

Incident Response

We have a documented plan for identifying, containing, and notifying on security incidents.

Detection

System logs, error monitoring (Sentry), and alerting are active 24/7. Anomalous access patterns trigger automated alerts.

Containment

On confirmed breach: affected tenant access is isolated within 1 hour. The database row-level security layer limits blast radius to the affected tenant.

Notification

Affected firms are notified within 72 hours of a confirmed breach that affects their data, consistent with GDPR and applicable US state law notification requirements.

Post-incident review

Every security incident is documented in a post-mortem report with root cause analysis, timeline, and remediation steps.

Vulnerability Disclosure

If you believe you have discovered a security vulnerability in Lexitio, please report it responsibly to security@lexitio.com. We will acknowledge your report within 2 business days, provide regular status updates, and work with you on responsible disclosure timing. We do not take legal action against researchers who follow responsible disclosure principles.

SOC 2 Compliance Roadmap

In ProgressSOC 2 Type I — target Q3 2026

Our security controls are built to the SOC 2 Trust Service Criteria from day one. Formal SOC 2 Type I certification is targeted for Q3 2026, with Type II to follow after the required 6-month observation period.

Enterprise firms requiring a SOC 2 report or a security questionnaire prior to contracting should contact security@lexitio.com — we maintain a pre-certification security questionnaire and can provide a Business Associate Agreement on request.

Contact

Security issues

security@lexitio.com

Enterprise / BAA requests

enterprise@lexitio.com