Security
Sovereign encryption—protection to the highest standard.
TLS 1.3, hosting in Germany, no US hyperscalers—aligned with professional secrecy.
TLS 1.3, processing on dedicated infrastructure in Germany, no US hyperscalers—supports solicitors’ duties (LPP / UK GDPR) as instruction-bound processing.
At a glance
Transit, retention, location.
- TLS 1.3 & upload checksEncrypted to our servers; decryption only in RAM for processing.
- No archival copiesNo long-term client archive—interim data removed after the run.
- Germany, no US hyperscalersOur hardware in Germany—no AWS/Google/Azure.
Protecting your data and your professional secrecy is our top priority. We deliberately chose sovereign German infrastructure that consistently avoids US hyperscalers—giving you a protected space for client matter without compromising security.
Jonas Maximilian Regul
Managing director · Strategy
Common questions
Short—see the white paper for technical detail.
Why is data processed on LexLogik servers?
OCR and analysis need server compute—reliably for large files, in our protected infrastructure.
What happens to your files?
TLS to DE; decrypt only for processing in RAM. No long-term archive copies—see the Security white paper.
Why can interim copies exist on the server for a while?
Short buffer for drops/reloads—deleted after purpose or retention, documented in our technical materials.
Why invest so much in backend safeguards?
Technical boundaries instead of empty promises—baked into the product, documented openly.
Additional hardening and clear access boundaries take engineering—for us that is an integral part of the product. We rely on technical barriers rather than promises alone. A single measure is not a silver bullet, which is why we commit to a transparently documented overall concept.
Clemens Schmid
Co-founder · Technology
Can LexLogik staff read my files?
We design systems so operational access stays limited to what’s technically necessary (need-to-know). Still, no cloud provider can credibly promise a 100% guarantee that authorised people could never access processed data in an edge case—that’s why we document controls openly and recommend involving your firm IT as well.
We restrict the highest administrative access to the production environment to founders Jonas Maximilian Regul and Clemens Schmid. Data is not stored long-term on disk in the clear; processing happens in a controlled server environment. Deliberate access would contradict our documented safeguards—and we treat this topic as a top priority.
We restrict the highest administrative access to the production environment to founders Jonas Maximilian Regul and Clemens Schmid. Data is not stored long-term on disk in the clear; processing happens in a controlled server environment. Deliberate access would contradict our documented safeguards—and we treat this topic as a top priority.
Try LexLogik in your practice
All features unlocked. No credit card. No automatic subscription.