Skip to content


The world’s leading law firms trust Legatics

We’ve built Legatics to the highest security standards and provide industry-leading permissions to customise the security of each transaction.

Cloud security

Security, compliance, and privacy are built-in

Legatics’s cloud-native architecture is built on top of Amazon Web Services. This, together with the use of third party tools, ensures network security, resilience, and reliability.

Web application firewall

Inspects each request and blocks any that are inappropriate.

Intrusion detection and prevention

Provided by our central monitoring system.

Security audits and penetration tests

Conducted every year by certified providers.

Application security

Matter security is in your control

Legatics’s platform is built to enable you, and your users, to have granular control over who can access matters and who can see information inside those matters.


Control who can access Legatics.

Comprehensive user permissions

Fine tune matters to your requirements.

Audit trail

Record user actions for everyone.

Legatics dashboard permissions screen

Data security

Protecting your data is our priority

Legatics takes data security extremely seriously. We take every step possible to ensure that all user data is secure.

Data encryption

All data uploaded to Legatics is encrypted at rest with AES-256 bit encryption – and all requests must be made over HTTPS using TLS v1.2 or higher.

Data separation

Each customer has their own tenancy, with the data logically separated from data in another customer’s tenancy.


Data is backed up on a regular basis to prevent the risk of data loss.

Organisation security

Security is our passion

Security at Legatics extends beyond systems and technologies. It’s also embedded into our organisational culture and everyday business processes.

ISO 27001:2022

Legatics holds an ISO 27001:17 certificate issued by the British Assessment Bureau (BAB). This confirms that Legatics has been internally and externally audited for compliance with the ISO 27002 control set.


Legatics has developed a comprehensive set of security policies, which are updated frequently and communicated to all employees.

Employee screening

Legatics performs background checks on all new employees in accordance with the laws applicable to our business.

This is the tip of the iceberg

Book a demo to learn more about how we secure your transactions.