We use multiple layers of data protection and comply with global privacy regulations to make sure your
confidential company data and other information is kept private and secure.
At Lexacon.ai we deeply share your desire to protect your confidential information and personal data.
We have worked hard to incorporate multiple layers of data security across our product stack and we comply with leading privacy regulations.
Data encryption (at rest & in transit)
Privacy policies (GDPR)
Data protection officer
Permanent deletion of data on request
Isolated (closed, secure) instance
No data sharing
Compliant privacy settings
Intrusion detection systems
Web-app Firewall
Anti DDoS protection
Incident response plan
Strict role-based access
User access data logging
User access data auditing
Disk encryption
Closed development environment
Highly secure hosting
GDPR Compliant (UK based)
ISO 27001 (waiting approval)
Regular audits
Encryption-at-Rest
All user data is encrypted when stored on Lexacon.AI servers using industry-standard AES-256 encryption, ensuring that data remains protected even in the event of unauthorized access to storage systems.
Encryption-in-Transit
Lexacon.AI uses TLS (Transport Layer Security) 1.2 or higher to encrypt all data transmitted between the client’s device and our servers, preventing eavesdropping or interception by malicious actors.
Privacy Policy
Our privacy policy outlines how user data is collected, used, stored, and protected. Users can access this policy at any time via our website (https://www.lexacon.ai/legal).
Cookies
Our software uses cookies to enhance user experience and track necessary metrics. Users are informed about cookie usage through a cookie banner and can manage their preferences. (https://www.lexacon.ai/legal ).
Data Privacy Officer (DPO)
We have appointed a DPO to oversee compliance with data protection laws and handle any user inquiries regarding their data privacy rights. Please email at legal@lexacon.ai.
Role-Based Access Control (RBAC)
RBAC ensures that users only have access to the data and functionalities necessary for their role. Permissions are predefined based on user roles (e.g., Admin, User, Viewer), limiting the risk of unauthorized actions or data exposure.
Password Security
We enforce strong password policies, including minimum length, complexity requirements. Multi-factor authentication (MFA) is enforced encouraged on key services.
Data Access
Access to user data is strictly controlled and limited to authorized personnel. All access is logged and monitored for compliance.
Secure hosting
Lexacon.AI's infrastructure is hosted on secure servers, using cutting-edge infrastructure for modern application hosting. Our hosting provides enables automatic scaling, globally distributed edge networks, and built-in security features, ensuring robust protection against threats.
Separate Production and Development Environments
Production environments are completely isolated from development and staging environments to prevent unauthorized access and data leakage during development or testing.
Disk Encryption
All disks used in our servers, including backups, are encrypted using AES-256 to ensure the safety of stored data.
Threat Detection
Our system is continuously monitored for threats using advanced tools, including Intrusion Detection Systems (IDS).
Web Application Firewall (WAF)
We implement a WAF to protect against common web vulnerabilities such as SQL injection, cross-site scripting (XSS), and other threats.
Anti-DDoS Protections
Our system is protected against Distributed Denial of Service (DDoS) attacks through the use of advanced traffic filtering, rate limiting, and third-party DDoS protection services.
Logging
Comprehensive logging mechanisms track user activity, administrative actions, and system events. Logs are reviewed regularly for unusual patterns and retained according to our data retention policy.
Incident Response Plan
A detailed incident response plan is in place to manage and mitigate the impact of security incidents.
Regular Security Audits
Third-party security audits are conducted to identify and remediate vulnerabilities.
Backup and Recovery
Regular backups are taken and stored securely to ensure quick recovery in case of data loss or system failure.
What is Lexacon?
Lexacon is an AI powered software that interprets and finds project information in the project record, and automates commercial workflows from contract to claim, dramatically increasing productivity for commercial teams, claims specialists, and construction ecosystem players.
Can anyone use Lexacon?
Lexacon AI is currently designed to deal with data for businesses that work in the construction industry or that need construction (e.g. Oil and Gas, Mining, Utilities, Data Centres). The AI model is built and trained for construction.
Anyone dealing with construction contracts and data - lawyers, sales teams, administration, business owners - can accelerate their commercial workflows with Lexacon.
How much does Lexacon cost?
Contact us for detail cost information. We use an outcomes based pricing model that uses tokens for outcomes. Book a demo and ask us about our pilot program.
Is it easy to onboard and integrate Lexacon?
Lexacon is a SaaS tool and can be used as stand-alone. For maximum benefit our team suggests connecting Lexacon to your source data systems through APIs. Our team has deployed technology solutions at tens of clients including some of the largest companies in the world and we know what it takes to work with enterprise stakeholders to ensure you get the most out of our platform. We offer training and onboarding services as part of our engagement with you.
Which data security standards do you comply with?
Lexacon AI is built to be fully compliant with global data security standards - GDPR, ISO 27001 and others. We are completing some key certification processes and can share more details on a call.
Is my data kept private?
We provide clients private tenants, and we focus on using internal LLM and computer vision models so your data isn't shared externally. Where we might use an external model we have no retention agreements in place. We don't keep your files on our platform, we chunk and vectorize your data and store the embeddings so once we do our initial processing we remove all your files from our platform.
Where is Lexacon AI based?
We based in the UK and the UAE and can accommodate geographical requirements for data privacy as needed.
More questions?
Contact us anytime at contact@lexacon.ai and we will be happy to answer your questions.