Trust Portal

Welcome to our Trust Portal for ContractPodAi services - your gateway to understanding our unwavering commitment to data security, privacy, and compliance. Here, you can access our comprehensive compliance documentation, find answers to frequently asked questions related to security and privacy, and explore our robust security practices. We believe in maintaining transparency and building trust with our customers, and this portal is designed to provide you with the information and assurance you need to feel confident in our ability to protect your data.

Product Security

Audit Logging

ContractPodAi has implemented comprehensive audit logging to maintain the integrity and accountability of all system activities. Our centralized logging system ensures all actions are recorded and regularly reviewed to detect and mitigate potential security threats.

Data Security

Our data security measures include robust encryption for data at rest and in transit, regular data backups, and stringent data retention and deletion policies to ensure data integrity and protection against unauthorized access.

Multi-Factor Authentication

ContractPodAi supports multi-factor authentication (MFA) via integration with the customer’s chosen identity provider (IdP).

Role-Based Access Control

Role-based access control (RBAC) capabilities exist to manage permissions, ensuring that users only have access to the data and systems necessary for their role, reducing the risk of unauthorized access.

Service-Level Agreements

As an MS Azure hosted platform, we guarantee 99.9% uptime, with maintenance always scheduled on weekends.

SSO Support

ContractPodAi supports single sign-on (SSO) integration through multiple identify providers (IdPs). Two-factor authentication is configured through the IdP provider when SSO integration is enabled.

Data Security

Backups

Regular backups are performed to ensure data integrity and availability. Our backup processes facilitate quick recovery in case of data loss, ensuring business continuity.

Data Deletion / Data Retention

ContractPodAi have strict data retention and deletion policies to manage the lifecycle of sensitive information, ensuring compliance with legal and regulatory requirements.

Encryption-at-rest

All customer data is encrypted at-rest using AES-256. ContractPodAi is committed to following encryption best practices per industry guidelines and continually reviews the rigor of current encryption standards.

Encryption-in-transit

All customer data is encrypted in-transit using TLS 1.2. ContractPodAi is committed to following encryption best practices per industry guidelines and continually reviews the rigor of current encryption standards.

Physical Security

All physical security and environmental controls are managed and maintained by the Azure cloud. https://docs.microsoft.com/en-us/azure/security/fundamentals/physical-security

App Security

Code Analysis

Static application security testing, dynamic application security testing, open-source scanning and secrets scanning are employed to detect and mitigate vulnerabilities during the development lifecycle, ensuring the security of our application.

Software Development Lifecycle

ContractPodAi follows a secure software development lifecycle (SDLC) to integrate security into every stage of our software development process, ensuring robust and secure applications.

Vulnerability & Patch Management

Regular vulnerability assessments and timely patch management practices are in place to address security weaknesses and protect against threats, maintaining system security.

Additionally, ContractPodAi undergoes annual independent penetration testing over the in-scope external network surface, CLM web application, and all CLM APIs. Results of the aforementioned penetration tests are fed into our Vulnerability Management Program and remediated in accordance with our policy timelines.

Web Application Firewall

ContracPodAi has implemented a WAF within all environments across all available regions.

Legal

Sub processors

ContractPodAi carefully vets and monitors the sub processors to ensure they meet our stringent security and privacy standards, maintaining the integrity and security of our supply chain. View our DPA for more information.

Cyber Insurance

ContractPodAi has extensive insurance coverage to mitigate the potential loss due to a cybersecurity incident.

Privacy Policy

Our privacy policy outlines how ContractPodAi collects, uses, and protects personal data, ensuring transparency and compliance with applicable regulations. View our Privacy Policy.

Data Privacy

Data Breach Notifications

ContractPodAi has a robust process for detecting, managing, and notifying affected parties of data breaches in a timely manner, minimizing impact and ensuring compliance.

Employee Privacy Training

Regular privacy training is provided to all employees, ensuring they understand their responsibilities and best practices for data protection.

Privacy Office

ContractPodAi has designated a Privacy Officer who is responsible for implementing measures and a privacy governance framework to manage customer data in compliance with applicable laws and regulations.

Access Control

Data Access

Access to data is restricted based on role and necessity, ensuring that only authorized personnel can access sensitive information, thus minimizing the risk of unauthorized access.

Access to internal systems is adherent to the principles of least privilege and separation of duties, subject to regular review by administrators, documented with clear rationales for provisioning and changes, and revoked according to strict termination policies.

Logging

All activity and corresponding logs are logged in ContractPodAi’s Security Incident Event Manager (SIEM) tool. The SIEM tool is configured to generate alarms for suspicious activity and is monitored 24/7/365. All logs which track access, use, modifications, or deletions of Collected Data are ingested into ContractPodAi’s SIEM for monitoring. Logs are retained for forensic purposes.

Password Security

Strong password policies are enforced, including complexity requirements and regular changes, to enhance account security and protect against unauthorized access.

Infrastructure

Azure

ContractPodAi infrastructure is hosted by Azure in multiple regions. Additional information on Azure infrastructure security can be found at https://learn.microsoft.com/en-us/azure/security/fundamentals/infrastructure

Anti-DDoS

Anti-DDoS protections are in place to defend against distributed denial-of-service attacks, ensuring service availability and resilience against external threats.

BC/DR Planning & Testing

Business continuity and disaster recovery (BC/DR) plans are regularly tested to ensure rapid recovery and minimal disruption in the event of a disaster, ensuring business resilience.

Network Time Protocol

Network time protocol (NTP) is used to synchronize the clocks of our systems, ensuring accurate timekeeping and consistency across the network.

Separate Production Environment

Our production environment is segregated from development and testing environments to enhance security, ensuring that production systems are isolated from potential risks during development and testing.

Endpoint Security

Endpoint Detection & Response

Advanced endpoint detection and response (EDR) solutions are deployed to detect and mitigate threats at the endpoint level,

Mobile Device Management

ContractPodAi centrally manages and secures all employee endpoints through a Mobile Device Management (MDM) solution. This systematic management allows us to enforce security policies, distribute software and updates, and monitor endpoint integrity.

Threat Detection

ContractPod AI’s Security team continuously monitors the environment for known attacker tactics, techniques, and procedures (TTPs), as well as for malicious binaries and other suspicious activities. These ongoing efforts are supported by periodic reviews and investigations into unusual activities to identify previously unknown threats, conducted on a regular schedule.

DNS Filtering

To improve endpoint security, ContractPodAi uses DNS filtering mechanisms to block access to malicious web traffic. This preventive measure is supported by regular monitoring.

Network Security

Firewall

Network access to both internal and external services is regulated through the use of firewalls and a Demilitarized Zone (DMZ) to safeguard internal systems and services.

IPS/IDS

Intrusion prevention and detection systems (IPS/IDS) are employed to identify and mitigate potential threats in real-time, enhancing network security.

SIEM

ContractPodAi has 24/7 SOC monitoring provided by a third-party MSSP. All relevant security logs are logged into a central SIEM solution, correlated, and detected for any threat or anomalous activity.

Data Exfiltration Monitoring

ContractPodAi monitors for potential data exfiltration attempts to prevent unauthorized data transfers out of the network, safeguarding sensitive information.

DMARC

Domain-based Message Authentication, Reporting & Conformance (DMARC) is used to protect our email domain from being used in phishing and email spoofing attacks, ensuring secure email communications.

Corporate Security

Asset Management

ContractPodAi maintains an up-to-date inventory of all IT assets to ensure proper management and security controls, protecting company resources.

Email Protection

Advanced email protection solutions are deployed to detect and block phishing and malware attacks, ensuring secure email communications.

Employee Training

Regular security training programs are conducted to educate employees about the latest threats and best practices, fostering a security-aware culture.

Governance

Our governance framework ensures that all security policies and procedures are adhered to and regularly reviewed, maintaining compliance and security standards.

Incident Response

ContractPodAi has a documented Incident Response Plan outlining the procedures for addressing potential security incidents. This plan undergoes systematic annual reviews, testing, and approval by relevant stakeholders to ensure it remains effective and ready for any security incidents.

Operational Risk Management

Our operational risk management practices identify, assess, and mitigate risks to ensure business continuity and security, aligning with industry best practices.

Third-Party Risk Management

ContractPodAi assesses and manages risks associated with third-party vendors to ensure they meet our security standards, protecting our supply chain and business operations.

HR Security

To ensure the integrity and security of our operations, all new ContractPodAi employees undergo a thorough background check and sign a non-disclosure agreement upon joining. These measures are part of our annually reviewed HR security policy, which mandates compliance with company policies and procedures designed to safeguard organizational assets and information.

Penetration Testing

ContractPodAi engages in third-party penetration testing every 6 months and upon the release of new products to proactively identify and address security vulnerabilities within our systems. The outcomes of these tests are documented, and any findings are prioritized for remediation according to their severity.

ContractPodAi does not use user data to develop, improve, or train generalized AI and/or ML models.