close

Encrypted end-to-end

Activity logs are AES-256 encrypted on the device before they leave it. Data is encrypted in transit via TLS 1.3 and at rest in all storage layers.

UK data residency

All processing and storage takes place exclusively in UK data centres. Your data physically never leaves the United Kingdom.

Minimal data capture

The desktop agent captures only activity metadata — window titles, document names, calendar events. Never keystrokes, screenshots, or file contents.

Access controls

Role-based access by default. Fee earners see only their own data. Admins see firm-wide summaries. No cross-firm data access is architecturally possible.

DPA as standard

A full Data Processing Agreement is provided to every client on day one — not on request. You have what you need for your own GDPR compliance records from the start.

72-hour breach notification

In the event of a security incident affecting your data, we notify you within 72 hours in accordance with Article 33 of UK GDPR — no exceptions.

What the desktop agent captures — and what it never does

The agent is designed around a single principle: it should know that you were working, and roughly on what, without ever knowing the substance of what you did.

Desktop Agent Data Policy
Captures
  • Active application name
  • Window and document title
  • Browser tab title and domain
  • Calendar event title and duration
  • Active / idle timestamps
Never captures
  • Keystrokes or typed text
  • Screenshots or screen recordings
  • File or document contents
  • Email body text
  • Full URLs or query strings
  • Clipboard contents

Encryption

Activity logs are encrypted on-device using AES-256 before transmission begins. The encryption key is derived per-firm — Draftsheet ai staff have no ability to decrypt raw logs. Only your firm holds the key that can read your data.

All network communication uses TLS 1.3. Data at rest in our infrastructure is encrypted at the storage layer using AES-256. Database backups are encrypted with separate keys and stored in isolated access zones.

Infrastructure and access controls

Our infrastructure runs on UK-based cloud providers. Production systems are isolated from staging and development environments at the network level. No developer has standing access to production data — access requires a formal request, approval, and is fully logged.

The desktop agent

The agent is distributed as a signed executable for Mac and Windows. Code signing certificates are verified on install — the agent cannot be modified or replaced without invalidating the signature. IT departments can verify the signature hash before deployment.

The agent communicates only with Draftsheet ai's designated API endpoints. It does not open any inbound ports and cannot be used as a vector for external access to the lawyer's machine.

Compliance and certifications

Our infrastructure sub-processors hold the following independent certifications:

SOC 2 Type II
Independently audited security, availability, and confidentiality controls assessed over a sustained period.
ISO 27001
International standard for information security management systems with independently verified controls.
UK GDPR
Full compliance with the UK General Data Protection Regulation. ICO registered as data controller and processor.
Cyber Essentials
UK government-backed certification covering the five key technical controls against the most common cyber attacks.

Incident response

We maintain a documented security incident response plan. In the event of an incident:

Our incident response procedure is available in full to your Data Protection Officer on request.

Responsible disclosure

If you discover a security vulnerability in our platform, we ask that you contact us privately at [email protected] before any public disclosure. We will acknowledge your report within 24 hours and aim to resolve confirmed issues within 30 days.