PDF.LEGAL← Back to Home

Security

Effective: April 2026

Our Approach to Security

Protecting confidential legal materials is at the core of PDF.LEGAL's architecture. We employ defense-in-depth strategies across every layer of the platform.

Authentication

Access is governed by PIN-based authentication secured with PBKDF2-SHA256 key derivation at 600,000 iterations — exceeding OWASP minimum recommendations.

Processing Deployment Options

  • Cloud Processing (OpenAI): Documents travel over TLS-encrypted channels to the AI provider. No case data is persisted by the provider after analysis completes.
  • On-Premise Processing (Ollama): The entire analysis pipeline runs within your own infrastructure. Zero data egress — your files never touch an external server.

Encryption Standards

Every byte in transit is shielded by TLS 1.2 or higher. Platform secrets and API credentials are managed through environment variables and never committed to source control.

Hosting Environment

PDF.LEGAL operates on hardened Linux infrastructure with automated patch management, network-level firewall rules, and comprehensive access logging.

Vulnerability Disclosure

Discovered a potential security issue? Please report it to we@lawnova.pro. Our team investigates every report and responds within 48 hours.