Understanding Our Privacy Policy
Learn how vLex protects your data. This summary of our privacy policy covers data usage, security, and your rights as a user of our legal research platform.
Summary
Our commitment to trust is built on a robust framework of data protection, operational security, and legal tech compliance with standards like SOC2 and ISO 27001. This ensures your firm's sensitive information is always protected.
Why This is Important
We understand that the security and confidentiality of your and your clients' data is a top priority. As a platform engineered for lawyers, vLex is built on a foundation of trust and transparency. This guide outlines the core security and privacy measures we have implemented to protect your sensitive legal information at every level.
Our Trust Framework
Our security and privacy program is built on three key pillars: Data Protection, Operational Security, and Compliance.
1. Data Protection & Privacy
We incorporate core data protection principles into every aspect of our service, ensuring that any data we handle is processed lawfully, for specific purposes, and is always kept secure.
Your Data is Always Encrypted: All your data is continuously protected using a FIPS 140-2 compliant cryptographic suite, a standard trusted by governments for securing sensitive information, for all data at rest and in transit.
You Control Your Data's Location: To meet your specific compliance and data residency requirements, we can configure your account to ensure your data is hosted in a specific geographic region of your choice, including the US, AU, or EU.
Transparent Data Usage: We collect the personal data necessary to provide and personalize your service. We will not share your personal information, except with the necessary and vetted service providers required to deliver the service (e.g., payment processors).
2. Operational Security
Our internal processes are designed to maintain a secure environment and provide you with full visibility.
Regular Penetration Testing: We engage independent third parties to perform security penetration testing on our platform to identify and remediate potential vulnerabilities.
Role-Based Access Control: Access to all internal systems and data is strictly controlled via role-based security, ensuring only authorized personnel can access sensitive information under specific, documented circumstances.
Data Protection Officer (DPO): We have a dedicated DPO to oversee our data protection strategy and ensure compliance. You can contact them directly at [email protected].
3. Compliance & Third-Party Verification
We are committed to adhering to the highest international standards for security and data protection.
Certifications: vLex has achieved both ISO 27001 and SOC2 certification, demonstrating our commitment to a formal and audited security program.
Evolving Regulations: We proactively monitor the evolving global landscape of data privacy to ensure our platform continues to meet the highest standards of compliance.
Best Practices & Pro Tips
Manage Your Settings: You can access and amend your personal privacy and cookie settings at any time from the Manage your account menu.
For a complete legal understanding of how we handle personal information, we recommend reviewing our official Privacy Policy.
Related Articles
What's Your Next Step?
New to vLex Library ?
Already a vLex Library Customer?
Last updated
Was this helpful?

