Skip to content

Building Trust Through Security, Compliance, and Transparency

Data Security

Data Security is at the Core of Our Platform

Compliance and Certifications

Trusted by Industry Standards

Privacy Practices

Your Privacy Is Our Priority

Infrastructure & Technology

Powering Security with AWS and Azure

Incident Management

Proactive Incident Management and Response

Training and Awareness

Empowering Security Awareness

Resources & Documentation

Resources to Support Your Trust

Intelligent legal solutions Logo

Connect with us on Social Media

Subscribe To Our Mailing List

© 2025 Intelligent Legal Solutions (ILS) Limited. Registered in England and Wales under company number 14475950

Intelligent legal solutions ProVision Logo

Introducing ProVision, your side letter management solution.

ProVision dashboard shown on a computer screen mockup

SUBSCRIBE TO OUR MAILING LIST

Intelligent legal solutions Logo

Data Security is at the Core of Our Platform

Encryption and Protection

  • Data is encrypted both in transit and at rest using AWS Key Management Service.

Identity and Access Management

  • We use IAM policies and role-based access controls to secure user access.

Network Security

  • We deploy a proprietary mix of Virtual Private Cloud (VPC), Security Groups, and firewalls to protect the platform.

Need more information or have specific questions? Contact us to learn how we can assist you further.

Intelligent legal solutions Logo

Compliance and Certifications

At Intelligent Legal Solutions, compliance and data security are at the core of everything we do. We are proud to hold SOC 2 Type 2 certification, demonstrating our commitment to protecting your data through rigorous security protocols. Additionally, we are fully GDPR compliant, ensuring that your personal and business information is managed with the utmost care and in accordance with global privacy standards. Whether you’re navigating regulatory requirements or need reassurance about the security of your data, you can trust us to deliver robust and compliant solutions. For more information or inquiries, please contact us here. 

Intelligent legal solutions Logo

Data Minimization and Transparency

  • We have a variety of data privacy policies, click here (this should be to email us) to learn more

Your Rights

  • The right to be informed – users have the right to be informed about the collection and use of their personal data,
  • The right of access – users have the right to access their personal data and supplementary information,
  • The right to rectification – users have the right to have inaccurate or incomplete personal data corrected or completed,
  • The right to erasure (also known as the “right to be forgotten”) – users have the right to have their personal data erased under certain conditions,
  • The right to restrict processing – users have the right to request the restriction or suppression of their personal data under specific circumstances,
  • The right to data portability – users have the right to obtain and reuse their personal data for their own purposes across different services,
  • The right to object – users have the right to object to the processing of their personal data in certain situations, including for direct marketing,
  • Rights related to automated decision-making and profiling – users have the right to not be subject to a decision based solely on automated processing, including profiling, which has legal or similarly significant effects on them 

          Please see a link to our Privacy Policy here.

Need more information or have specific questions? Contact us to learn how we can assist you further.

Intelligent legal solutions Logo

Powering Security with AWS and Azure

AWS Infrastructure

  • We rely on multiple AWS features such as Amazon S3 for secure data storage, EC2 for compute power, and RDS for database management.

Microsoft Azure Integration

  • We use Azure Active Directory to support our Single Sign-On and access control.

Need more information or have specific questions? Contact us to learn how we can assist you further.

Intelligent legal solutions Logo

High-Level Summary of Incident Response Process

Our incident response process is a systematic approach to identifying, addressing, and resolving security incidents to protect our users and maintain platform integrity. It begins with detection and monitoring, where tools such as AWS CloudTrail, AWS Config, and Amazon CloudWatch are utilized to continuously scan for suspicious activity, anomalies, or potential security breaches. These tools provide real-time alerts and logs, enabling the team to swiftly recognize potential threats before they escalate. Once an incident is detected, the assessment phase evaluates its severity, scope, and potential impact, helping prioritize response efforts based on criticality.

The process then moves into containment, eradication, and recovery. Containment involves immediate actions to prevent the incident from spreading, such as isolating compromised systems, revoking access credentials, or blocking malicious traffic. During eradication, the root cause of the issue is identified and eliminated, whether it’s removing malware, patching vulnerabilities, or addressing insider threats. The final recovery step ensures the safe restoration of affected systems, verifying their integrity and returning them to normal operations. A post-incident review follows to analyze lessons learned, improve security processes, and reduce the risk of recurrence. Communication throughout the process is a priority, with relevant stakeholders and, when applicable, users and regulatory bodies being informed promptly and transparently.

Need more information or have specific questions? Contact us to learn how we can assist you further.

Intelligent legal solutions Logo

Resources and Documentation

Need more information or have specific questions? Contact us to learn how we can assist you further.

Intelligent legal solutions Logo

Summary of Employee Training Programs on Secure Coding, Data Protection, and Phishing Prevention

Our employee training programs are designed to instill a culture of security awareness and equip team members with the skills to proactively address evolving threats. Secure coding practices are a core focus, with developers trained on topics such as input validation, output encoding, session management, and error handling. Regular workshops and code reviews emphasize the importance of adhering to industry best practices and secure coding standards to prevent vulnerabilities such as SQL injection and cross-site scripting (XSS). Developers also learn to leverage automated tools for static and dynamic code analysis, ensuring security is integrated at every phase of the software development lifecycle.

Training extends to data protection and phishing prevention for all employees. Sessions highlight best practices for handling sensitive information, recognizing and reporting potential phishing attacks, and avoiding social engineering traps. Employees participate in hands-on simulations, such as phishing email exercises, to hone their ability to identify suspicious communications. Regular updates and refresher courses keep team members informed about the latest security trends and tactics used by attackers. This holistic approach ensures every employee is a proactive participant in safeguarding the organization’s data and systems.

Tips for Users to Protect Their Accounts

To further enhance security, users are encouraged to adopt simple yet effective measures to protect their accounts. One of the most critical steps is enabling multi-factor authentication (MFA), which adds an extra layer of security by requiring a second verification step, such as a code sent to a mobile device. MFA significantly reduces the risk of unauthorized access, even if a password is compromised. Users should also create strong, unique passwords for each account and consider using a password manager to securely generate and store them.

Another essential tip is to remain vigilant against phishing attempts. Always verify the sender’s email address, avoid clicking on suspicious links, and be cautious of requests for sensitive information. If an email or message seems suspicious, report it to the platform’s support team. Additionally, users should regularly update their account recovery information, such as backup email addresses or phone numbers, to ensure they can regain access if needed. By following these practices, users can enhance the security of their accounts and contribute to a safer platform environment.

Need more information or have specific questions? Contact us to learn how we can assist you further.

Skip to content