Lawbotics Pro • Security

Security Built for Real Legal Workflows

This page reflects controls currently implemented in the app today, including encryption, presigned URL file handling, role-based access controls, and Zoom clickjacking protections.

Encryption at rest & in transit Presigned S3 access model Role-based access controls Clickjacking defenses

Data Encryption and Storage Security

Documents, evidence, and core records are protected using AWS-managed encryption controls in storage and secure transport protocols in motion.

Encryption at rest

Documents and evidence are stored in Amazon S3 with Server-side encryption with S3-managed keys (SSE-S3 / AES-256). Core structured records are stored in encrypted DynamoDB tables.

Encryption in transit

API traffic runs over HTTPS (TLS 1.2+), and realtime app connectivity uses secure WebSocket channels (WSS). File operations are signed and time-limited through presigned URL workflows.

What this means for clients: Your documents and core records are protected both when stored and while moving through the platform, using AWS encryption controls and secure transport protocols.

Pinecone Vector Data Security

Vector-indexed case data is handled through Pinecone. Per Pinecone's published security documentation, stored data is encrypted at rest with AES-256, and data in transit is protected via TLS 1.2 over HTTPS/gRPC using AES-256 encryption.

Encryption at rest (Pinecone)

Pinecone documents that stored data is encrypted using the 256-bit Advanced Encryption Standard (AES-256).

Encryption in transit (Pinecone)

Pinecone documents TLS 1.2 protection for HTTPS/gRPC connections, using AES-256 encryption for data in transit.

What this means for clients: Data in Pinecone is protected with encryption at rest and in transit under Pinecone's documented security model.

Presigned URL Access Model (S3)

Uploads and downloads are brokered through backend-generated presigned URLs. Frontend clients do not require direct S3 credentials.

Signed uploads

The backend generates presigned POST URLs for controlled uploads. Signatures and expiry windows reduce exposure and enforce bounded access windows.

Signed downloads

The backend generates presigned GET URLs for retrieval, with expiration controls. Access is temporary rather than permanent open links.

What this means for clients: Your files are only accessible to authorized users. Access is verified through the app, and secure, time-limited links are used to help prevent unauthorized exposure.

Role-Based Access Control (RBAC) and Case Isolation

Access is governed by role and assignment context, including lawyer-level isolation paths for case access patterns.

Role-aware access behavior

Admin users maintain broader oversight, while non-admin lawyer access is constrained by assignment and scoped identifiers in backend handlers.

Lawyer-level case isolation

Lawyer-specific paths and filtering logic are implemented for case and media access patterns, with admin visibility preserved for firm-level operations.

What this means for clients: Teams get practical least-privilege behavior: admin oversight where needed, and scoped lawyer access where case confidentiality boundaries matter.

AI and Agent Security Controls

Lawbotics AI workflows are built with a grounding-first approach: model calls run through Amazon Bedrock, retrieval uses case-scoped context, and prompt instructions are structured to keep responses precise and reduce drift.

Bedrock-based model execution

Model inference for summary and AI workflows is executed through Amazon Bedrock integrations in backend services, rather than direct client-side model access.

RAG (Retrieval Augemntated generation ) grounding on case context

CaseIQ Ask/Search style flows use retrieval over indexed case materials, so responses are context-grounded in firm/case data instead of free-form generation only.

Structured prompts and control logic

Prompt templates and response formatting logic are used to constrain output style and reduce hallucination/drift in legal workflows.

Private case-level Q&A posture

Case-level AI interactions are designed around private workspace context and scoped access controls, aligned with role/assignment boundaries in the app.

What this means for clients: AI responses are designed to stay anchored to your case context, with controlled prompting and scoped access controls to improve reliability and reduce off-context output during legal workflows.

Zoom Integration Security Hardening

Zoom-related endpoints include anti-clickjacking response headers to reduce iframe-based attack vectors during OAuth and meeting workflows.

Clickjacking protections

Security headers include X-Frame-Options: SAMEORIGIN and Content-Security-Policy: frame-ancestors 'self' on Zoom integration responses.

Additional response hardening

Related headers include X-Content-Type-Options, X-XSS-Protection, and strict referrer policy directives for Zoom endpoint responses.

What this means for clients: Zoom-connected workflows are hardened against framing abuse and related browser attack vectors, improving safety around calendar and OAuth interactions.