Securing what matters the most to your business

We use multiple layers of data protection and comply with global privacy regulations to make sure your
confidential company data and other information is kept private and secure.

Learn more

We are committed to keeping your data secure

At Lexacon.ai we deeply share your desire to protect your confidential information and personal data.

We have worked hard to incorporate multiple layers of data security across our product stack and we comply with leading privacy regulations.

Data protection

Data encryption (at rest & in transit)

Privacy policies (GDPR)

Data protection officer

Permanent deletion of data on request

Private LLM instance

Isolated (closed, secure) instance

No data sharing

Compliant privacy settings

Threat detection

Intrusion detection systems

Web-app Firewall

Anti DDoS protection

Incident response plan

Access control

Strict role-based access

User access data logging

User access data auditing

Physical security

Disk encryption

Closed development environment

Highly secure hosting

Compliance

GDPR Compliant (UK based)

ISO 27001 (waiting approval)

Regular audits 

How we manage security and data privacy at Lexacon

Data protection and privacy

Encryption-at-Rest

All user data is encrypted when stored on Lexacon.AI  servers using industry-standard AES-256 encryption, ensuring that data remains protected even in the event of unauthorized access to storage systems.

Encryption-in-Transit

Lexacon.AI  uses TLS (Transport Layer Security) 1.2 or higher to encrypt all data transmitted between the client’s device and our servers, preventing eavesdropping or interception by malicious actors.

Privacy Policy

Our privacy policy outlines how user data is collected, used, stored, and protected. Users can access this policy at any time via our website (https://www.lexacon.ai/legal).

Cookies

Our software uses cookies to enhance user experience and track necessary metrics. Users are informed about cookie usage through a cookie banner and can manage their preferences. (https://www.lexacon.ai/legal ).

Data Privacy Officer (DPO)

We have appointed a DPO to oversee compliance with data protection laws and handle any user inquiries regarding their data privacy rights. Please email at legal@lexacon.ai.

Access control and user management

Role-Based Access Control (RBAC)

RBAC ensures that users only have access to the data and functionalities necessary for their role. Permissions are predefined based on user roles (e.g., Admin, User, Viewer), limiting the risk of unauthorized actions or data exposure.

Password Security

We enforce strong password policies, including minimum length, complexity requirements. Multi-factor authentication (MFA) is enforced encouraged on key services.

Data Access

Access to user data is strictly controlled and limited to authorized personnel. All access is logged and monitored for compliance.

Infrastructure and physical security

Secure hosting

Lexacon.AI's infrastructure is hosted on secure servers, using cutting-edge infrastructure for modern application hosting. Our hosting provides enables automatic scaling, globally distributed edge networks, and built-in security features, ensuring robust protection against threats.

Separate Production and Development Environments

Production environments are completely isolated from development and staging environments to prevent unauthorized access and data leakage during development or testing.

Disk Encryption

All disks used in our servers, including backups, are encrypted using AES-256 to ensure the safety of stored data.

Threat detection and incident response

Threat Detection

Our system is continuously monitored for threats using advanced tools, including Intrusion Detection Systems (IDS).

Web Application Firewall (WAF)

We implement a WAF to protect against common web vulnerabilities such as SQL injection, cross-site scripting (XSS), and other threats.

Anti-DDoS Protections

Our system is protected against Distributed Denial of Service (DDoS) attacks through the use of advanced traffic filtering, rate limiting, and third-party DDoS protection services.

Logging

Comprehensive logging mechanisms track user activity, administrative actions, and system events. Logs are reviewed regularly for unusual patterns and retained according to our data retention policy.

Incident Response Plan

A detailed incident response plan is in place to manage and mitigate the impact of security incidents.

Compliance and transparency

Regular Security Audits

Third-party security audits are conducted to identify and remediate vulnerabilities.

Backup and Recovery

Regular backups are taken and stored securely to ensure quick recovery in case of data loss or system failure.

Frequently asked questions

What is Lexacon?

Lexacon is an AI powered software that interprets and finds project information in the project record, and automates commercial workflows from contract to claim, dramatically increasing productivity for commercial teams, claims specialists, and construction ecosystem players.

Can anyone use Lexacon?

Lexacon AI is currently designed to deal with data for businesses that work in the construction industry or that need construction (e.g. Oil and Gas, Mining, Utilities, Data Centres). The AI model is built and trained for construction.

Anyone dealing with construction contracts and data - lawyers, sales teams, administration, business owners - can accelerate their commercial workflows with Lexacon.

How much does Lexacon cost?

Contact us for detail cost information. We use an outcomes based pricing model that uses tokens for outcomes. Book a demo and ask us about our pilot program.

Is it easy to onboard and integrate Lexacon?

Lexacon is a SaaS tool and can be used as stand-alone. For maximum benefit our team suggests connecting Lexacon to your source data systems through APIs. Our team has deployed technology solutions at tens of clients including some of the largest companies in the world and we know what it takes to work with enterprise stakeholders to ensure you get the most out of our platform. We offer training and onboarding services as part of our engagement with you.

Which data security standards do you comply with?

Lexacon AI is built to be fully compliant with global data security standards - GDPR, ISO 27001 and others. We are completing some key certification processes and can share more details on a call.

Is my data kept private?

We provide clients private tenants, and we focus on using internal LLM and computer vision models so your data isn't shared externally. Where we might use an external model we have no retention agreements in place. We don't keep your files on our platform, we chunk and vectorize your data and store the embeddings so once we do our initial processing we remove all your files from our platform.

Where is Lexacon AI based?

We based in the UK and the UAE and can accommodate geographical requirements for data privacy as needed.

More questions?

Contact us anytime at contact@lexacon.ai and we will be happy to answer your questions.

Analyze your first contract
with Lexacon AI