top of page

Our approach to Security

Safeguarding the confidentiality of your data is our top priority.

Secure and Reliable
Legal Software in Asia-Pacific

Encrypted uploads

We take the security and confidentiality of our customers' data seriously. That's why we have implemented robust measures to ensure the protection of your valuable information.

 

One of these measures includes the use of Hypertext Transfer Protocol Secure (HTTPS) to encrypt all files uploaded to our platform. This end-to-end encryption provides a shield against eavesdropping, data tampering, and other types of cyber threats, giving you peace of mind knowing that your data is safe and secure.

Developed in Australia

Our software is fully developed in Australia and adheres to the stringent data protection laws of the country. We comply with the Australian Privacy Principles and other relevant regulations to ensure that your personal information is handled with the utmost care and in accordance with legal requirements.

Our commitment to data security includes implementing robust security measures, employing encryption technologies, and following industry best practices to safeguard your information from unauthorised access, use, or disclosure.

Data deletion policy

At KeyTerms, we follow a strict policy of permanent data disposal to ensure that our customers' data is protected and secure at all times. Once documents are uploaded and analysis is completed, they are automatically and permanently deleted from our system. 

​

The same applies to the deletion of summaries when relevant webpages are closed. Moreover, we take proactive measures by regularly purging our embedding database  every seven days, ensuring unauthorised access or misuse of customer data is prevented. Rest assured, your data remains protected throughout the entire process.

LLMs pose data confidentiality concerns, requiring strong anonymisation and protection measures by legal software developers. Learn More

Privacy and Confidentiality
Unique Double Security Approach

ai contract review software australia_ed

We highly value the sensitive nature of your contracts, recognising the presence of private and confidential information within them. To address this concern, we have developed an innovative double security approach, setting us apart as pioneers in the market.

 

We have implemented the cutting-edge and highly trusted large language model, GPT by OpenAI, to power our software. It's crucial to emphasise that GPT strictly adheres to a policy that excludes user-provided documents from being used in their model training. This ensures that your confidential information and proprietary data remain safeguarded throughout the analysis process.

​

In addition to leveraging the power of GPT, we have incorporated state-of-the-art machine learning models that employ advanced techniques to identify, redact, and replace personally identifiable information and other sensitive data within contracts. This additional layer of protection ensures that your confidential information remains secure and protected before any interaction with the language model.

 

You can have peace of mind knowing that our software prioritises the highest level of data privacy and security, allowing you to confidently utilise our platform for your legal document analysis needs.

Ensuring the Security of Your Data

We recognise and respect the confidential nature of the contracts you have entrusted to us. As such, our operations revolve around the strictest security and compliance standards. We prioritise customer privacy and take all necessary measures to ensure that our customers' personal and confidential data is protected and secure.

Security

We use encryption and access controls to safeguard customer-provided data, and do not access, use, analyse or store any customer-provided data.

Privacy and Confidentiality

We use advanced redaction tool to ensure the utmost protection of private and confidential information within contracts, effectively preventing its disclosure to language models.

​

Data Disposal

All documents uploaded by customers are permanently deleted once the relevant summaries are generated, and summaries are also permanently deleted when the relevant webpages are closed.

Exclusive AI Contract Review Software ,
without human verification. 

While some AI contract review softwares rely on a combination of AI and human verification for contract review, we embrace an 'Exclusive AI' approach.

 

We fully recognise the limitations of existing large language models and prioritise the continuous fine-tuning of our own models to consistently deliver optimal results, without the need for human vertification.

 

Discover more about the potential drawbacks of human contract review behind AI.

Data Protection


KeyTerms' data protection measures include: 
 

Logical separation of customer data

Encryption in transit and at-rest

Web application firewall

Distributed Denial of Service

Regular vulnerability scanning

Bot prevention

Login notifications

Real-time activity (audit) log

PII data deletion management

We have fully adopted cloud-native services as a cutting-edge approach to cloud computing. To achieve this, we have partnered with Amazon as our cloud service provider. Amazon provides us with Infrastructure as a Service (IaaS) offerings through Amazon Web Services (AWS). AWS is a suite of cloud computing services provided by Amazon that runs on the same infrastructure as their end-user products, ensuring continuous availability and layered security.

​

Within AWS, we created a virtual private cloud (VPC) to add another layer of virtual separation of services. We install and fine-tune a firewall configuration, create appropriate organisational structure within AWS, and utilise strict access and security controls to cloud services. This includes Identity & Access Management (IAM) roles and permissions, groups based on responsibility and function.

Reliable Infrastructure

bottom of page