Security
How we keep your data safe and secure
We protect your data with top-tier security, using encrypted connections, secure data centers, and constant monitoring. Access is strictly controlled and audited, ensuring only authorized individuals can view your data.
Authentication
We use Okta Auth0 for authentication. Each customer has a dedicated organization for licensed users. Only authenticated users can access their data.
Additional measures
We use a strong Content Security Policy (CSP) and CORS to ensure the API is accessed by trusted sources. All input is validated.
Backup
Regular backups of user data are made in order to ensure that these can be restored whenever necessary.
Data isolation
User data is isolated via row-level isolation, enforcing that user data can only be accessed by users within the same organization.
Data processing
Data is processed with secure Azure services and self-hosted solutions in isolated networks. Data transfer is encrypted using TLS 1.2+.
Data transfer
Data is transferred using HTTPS with end-to-end encryption using TLS 1.2+.
Storage
Data is encrypted on Azure databases. Document texts are stored on OpenAI vector stores. User data is not shared outside the organization.
Vulnerability management
We use Aikido for vulnerability management, linking it to our codebase to ensure security. Sentry monitors errors in both environments.
“Alice has been a game-changer for our firm, revolutionizing our processes and boosting productivity.”

Meet a new way of working with AI
By lawyers, for lawyers