Information Security Policy
This Security Policy governs the processing of data provided by a Subscriber in connection with their user license agreement (“Agreement”) or through the use of the LEAP Services. By using the Software, our services, or our website, or by signing an Agreement with LEAP, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Sites or App.
There is a lot of legitimate concern about cyber-security with many malicious actors seeking to extract money using nefarious online methods.
Whilst it might seem as if a server in your office with local PC’s is secure, if your inhouse network is connected to the Internet, it is incredibly vulnerable to attack, and Ransomware is typically placed on on-premise servers. Trojans often get placed on PC’s used for recreational purposes when we are least alert to danger.
LEAP has a dedicated in-house Information Security team that is dedicated to maintaining the security of client data in LEAP, LEAP itself, and of course all our internal systems that support our business.
Being a cloud solution, the software and all client data is stored on LEAP Servers, which are built on the AWS (Amazon Web Services) platform.
Amazon Web Services (AWS) is a leading cloud services platform, providing database storage, content delivery and a range of other functions. It is probably the largest and most successful cloud platform provider in the world.
AWS makes security its top priority, providing a data centre and network architecture built to meet the requirements of the most security-sensitive organisations such as NASA, Atlassian and Dow Jones. AWS is constantly evolving its core security services such as identity and access management, logging and monitoring, encryption and key management, network segmentation and Denial of Service (DDoS) protection.
LEAP stores data in the jurisdiction of origin, in the UK that is in Dublin, Ireland, in Australia that is in Sydney and in the United States in North Virginia. LEAP actively works to take advantage of AWS services, following Information Security best practices.
LEAP also makes continuous backups, so your LEAP data will be up to date to the time you last connected to the Internet.
We keep your LEAP data safe by adhering to industry best practices.
AWS has an extensive and constant Cyber Security presence (its reputation depends on it) and LEAP too has its own Information Security Team. We continually monitor our AWS environment, implementing updates and patches in line with best practices prescribed by AWS.
You can find out more about AWS security in the AWS Security & Compliance Quick Reference Guide (2018).
LEAP’s cloud infrastructure is maintained by the industry leading cloud platform provider, Amazon Web Services (AWS), in multiple unmarked facilities within the Sydney region.
The terms of agreement between LEAP & AWS, are here: aws.amazon.com/agreement
AWS has achieved a substantial amount of certification and compliance in industry standards, which recognise best practices in Information Security.
For a full listing of AWS certification and compliance, visit aws.amazon.com/compliance
LEAP utilises multiple layers of security controls (software, physical and process based) to protect our client data. This includes, but is not limited to:
LEAP understands security is of foremost importance to law firms. These are some security measures you can implement, alongside systems LEAP has developed to strengthen security for your law firm.
Each LEAP application is accessed via HTTPS using Transport Layer Security (TLS). TLS is a cryptographic protocol designed to protect information transmitted over the internet against eavesdropping, tampering, and message forgery.
Once client data reaches LEAP's cloud infrastructure, all information is then encrypted at rest, using AES-256, military grade encryption.
All LEAP staff who have direct access to our cloud infrastructure must go through an extensive vetting process, which includes police background checks. This ensures only bona fide team members are selected to look after our core platform.
LEAP has been designed to be a highly available, active-active solution. LEAP services are split over multiple AWS datacentres within the Sydney region. In the event of one data centre going offline in a disaster scenario, the second data centre continues to serve data with minimal, if any, service interruption.
LEAP’s service is designed to scale up as more clients use it at peak times, and then scale down at low times. This scaling allows LEAP to mitigate external attacks trying to flood our system resources.
The data contained in LEAP remains the property of the licensed subscriber. If the subscriber ends their agreement with LEAP, LEAP will retain the data for a minimum of seven (7) years, before having it destroyed.
At any time during the post active subscription, seven (7) year period, a subscription can be reactivated to gain access to the client data. Unless directed by the customer to remove all copies of data, backups of the data may remain in LEAP archives as part of our standard retention policies.
LEAP servers are backed up multiple times daily, weekly and monthly.
LEAP is monitored 24hours a day, 7 days a week, 365 days a year.
At LEAP, we strive to have the most secure solution we can. If you believe you’ve found a security vulnerability in our platform, please let us know on email@example.com.
If you believe LEAP client information has become publicly available, outside of LEAP, please contact us immediately on firstname.lastname@example.org for validation.
LEAP has a duty of care of our client’s data. If a data breach occurs, we must notify affected clients immediately.
This statement reflects the security policy of LEAP and is regularly reviewed and updated. It should be regarded as the primary source of truth regarding security within LEAP. Any questions should be directed to email@example.com.