SECURITY

At Lawzuit, we take the security of your data seriously. This page outlines our security practices, technical safeguards, and commitment to protecting your personal and case information.

DATA PROTECTION OVERVIEW

We implement industry-standard security measures to protect your data from unauthorized access, disclosure, alteration, and destruction. Our security program includes technical, administrative, and physical safeguards designed to protect sensitive information.

Key Security Principles:

  • Defense in depth with multiple layers of security controls
  • Principle of least privilege for data access
  • Encryption for data at rest and in transit
  • Regular security assessments and vulnerability scanning
  • Continuous monitoring and incident response capabilities

ENCRYPTION

DATA IN TRANSIT

All data transmitted between your browser and our servers is encrypted using:

  • TLS 1.3 (Transport Layer Security)
  • Strong cipher suites (AES-256)
  • Perfect forward secrecy
  • HSTS (HTTP Strict Transport Security)

This prevents eavesdropping and man-in-the-middle attacks on your data as it travels over the internet.

DATA AT REST

Your stored data is encrypted using:

  • AES-256 encryption for database records
  • Encrypted file storage for documents
  • Encrypted database backups
  • Secure key management with rotation

Even if physical storage media were compromised, your data remains protected by encryption.

ACCESS CONTROLS

We restrict access to your personal information through multiple layers of controls:

Authentication

  • Password requirements (minimum length, complexity)
  • Multi-factor authentication (MFA) available for all accounts
  • Session management with automatic timeout
  • Secure password reset procedures

Authorization

  • Role-based access control (RBAC) for internal systems
  • Principle of least privilege enforced
  • Segregation of duties for sensitive operations
  • Regular access reviews and revocation procedures

Logging and Monitoring

  • Comprehensive audit logs of data access
  • Automated alerts for suspicious activity
  • Regular log review and analysis
  • Tamper-resistant log storage

INFRASTRUCTURE SECURITY

Our application runs on secure, industry-leading infrastructure:

  • Hosting: Vercel (edge network with DDoS protection)
  • Database: Supabase (PostgreSQL with row-level security)
  • File Storage: Firebase Storage (encrypted, access-controlled)
  • Payment Processing: Stripe (PCI DSS Level 1 certified)
  • Email/SMS: SendGrid and Twilio (SOC 2 certified)

All infrastructure providers maintain their own security certifications and are contractually obligated to protect your data. See our Privacy Policy for details on subprocessors.

APPLICATION SECURITY

Our development practices prioritize security:

Secure Development

  • Security code reviews for all changes
  • Automated dependency scanning for vulnerabilities
  • Static application security testing (SAST)
  • Regular security training for developers

Vulnerability Management

  • Continuous vulnerability scanning
  • Timely patching of security issues
  • Third-party penetration testing (planned annually)
  • Responsible disclosure program

Common Attack Prevention

  • Protection against SQL injection, XSS, and CSRF
  • Input validation and sanitization
  • Content Security Policy (CSP) headers
  • Rate limiting and DDoS mitigation

COMPLIANCE AND CERTIFICATIONS

Lawzuit is committed to meeting industry security standards and regulatory requirements:

Current Compliance

  • CCPA (California Consumer Privacy Act): Data protection and user rights compliance
  • PCI DSS: Payment card security through Stripe integration (we don't store card data)
  • GDPR: Privacy controls for applicable users
  • TCPA/CAN-SPAM: Communications compliance

In Progress

  • SOC 2 Type II: We are working toward SOC 2 certification to demonstrate our commitment to security, availability, and confidentiality controls
  • WCAG 2.1 AA: Web accessibility compliance (see our Accessibility Statement)

DATA BACKUP AND DISASTER RECOVERY

We maintain comprehensive backup and recovery procedures to protect against data loss:

  • Automated daily backups of all databases
  • Encrypted backup storage in geographically diverse locations
  • Regular backup restoration testing
  • Disaster recovery plan with defined recovery time objectives (RTO) and recovery point objectives (RPO)
  • High availability architecture with automatic failover

In the event of a system failure or data loss incident, we can restore your data from secure backups.

SECURITY INCIDENT RESPONSE

We maintain a formal incident response plan to quickly detect, contain, and remediate security incidents:

  • 24/7 monitoring and alerting for security events
  • Defined incident response team and procedures
  • Incident classification and escalation protocols
  • Forensic analysis and root cause investigation
  • User notification in accordance with legal requirements

If we discover a data breach that affects your personal information, we will notify you in accordance with applicable laws and provide information about steps you can take to protect yourself.

REPORT A SECURITY ISSUE

We welcome reports of security vulnerabilities or concerns from the security research community and our users.

If you discover a security issue, please:

  • Email details to security@lawzuit.com
  • Include a detailed description of the vulnerability
  • Provide steps to reproduce the issue if possible
  • Do NOT exploit the vulnerability beyond what is necessary to demonstrate it
  • Do NOT access, modify, or delete other users' data

We will acknowledge receipt within 2 business days and work to validate and remediate confirmed issues promptly. We appreciate responsible disclosure and will credit reporters (if desired) once issues are resolved.

PROTECT YOUR ACCOUNT

While we implement strong security measures, account security also depends on your actions:

BEST PRACTICES

  • Use a strong, unique password (at least 12 characters with mixed case, numbers, and symbols)
  • Enable multi-factor authentication (MFA) on your account
  • Never share your password or login credentials
  • Log out when using shared or public computers
  • Keep your email account secure (it's used for password resets)
  • Be cautious of phishing emails claiming to be from Lawzuit
  • Verify the URL is https://lawzuit.com before entering credentials
  • Report suspicious activity to security@lawzuit.com

SECURITY QUESTIONS?

For security-related inquiries, vulnerability reports, or concerns about data protection, contact our security team.

Security Team: security@lawzuit.com

Privacy Requests: privacy@lawzuit.com

Last Updated: October 20, 2025

This security page may be updated periodically to reflect changes in our security practices and infrastructure.