Trust & Security

Built for the most sensitive work in finance

Capital markets transactions demand the highest standards of data security and confidentiality. Reliance AI is built from the ground up to meet them.

SOC 2 Type II
ISO 27001:2022
AES-256 Encryption
GDPR & CCPA Ready
256-bit AES encryption at rest
0 Customer data used for training
99.9% Uptime SLA
Annual Independent pen testing
Core Principles

Security by design, not afterthought

Trusted by leading capital markets law firms, Reliance AI is built to handle the most sensitive deal documents with the highest standards of security and privacy.

🔐
Encryption Everywhere

All data is encrypted both at rest and in transit using AES-256 and TLS 1.3 — modern, industry-standard protocols that meet the demands of regulated financial institutions.

🚫
No Training on Your Data

Your documents and deal data are never used to train AI models. Reliance AI operates purely in inference mode. Your confidential information stays confidential — always.

🛡️
Access Controls

Single Sign-On (SSO), Multi-Factor Authentication (MFA), and role-based access controls are supported across all Reliance products to ensure only authorised users can access deal data.

🔍
Penetration Testing

We conduct regular penetration testing with independent security experts to proactively identify and resolve vulnerabilities before they can be exploited.

📋
Audit Logging

Every action on a document is logged with a full audit trail — who accessed what, when, and from where. Full visibility for compliance and internal governance.

☁️
Secure Infrastructure

Reliance runs on enterprise-grade cloud infrastructure with real-time threat detection, vulnerability scanning, and automated incident response protocols.

Your data is never for sale — or training

A top concern for law firms considering AI tools is whether sensitive client documents are used for model training. At Reliance, the answer is simple: absolutely not.

  • Zero training on customer data

    RelianceComfort and RelianceBackup never use your documents, deal data, or outputs to improve our models.

  • Privacy by design

    Data minimisation and purpose limitation are built into our architecture. We collect only what's necessary to deliver the product.

  • GDPR & CCPA compliant

    We meet the requirements of both GDPR and CCPA, and support responsible AI adoption across the legal sector.

  • Right to deletion

    Your data can be fully deleted on request. We maintain clear data retention policies and honour all deletion requests promptly.

Controlled access, every time

Security is only as strong as its weakest authentication layer. Reliance enforces strong access controls at every level.

  • SSO & MFA enforcement

    Single Sign-On with your firm's identity provider and mandatory Multi-Factor Authentication on all accounts.

  • OAuth 2.0 & JWT

    APIs are secured using industry-standard OAuth 2.0 and JSON Web Tokens with short expiry windows and refresh token rotation.

  • IP allow-listing

    Restrict access to your Reliance workspace to approved IP ranges — so your deal data never leaves your firm's network perimeter.

  • Principle of least privilege

    Every internal system and team member is granted only the minimum permissions needed. Attack surface is minimised by design.

Compliance

Independently audited, continuously monitored

We hold ourselves to the same standards we'd expect from any vendor handling our most sensitive information.

Certification SOC 2 Type II Independently audited annual assessment of our security, availability, and confidentiality controls.
Certification ISO 27001:2022 Our information security management system is certified to the latest international standard by an accredited body.
Regulation GDPR & CCPA Full compliance with EU and California data privacy regulations, with DPAs available on request.
Testing Annual Pen Testing Independent penetration testing by third-party security experts, with findings remediated and publicly disclosed.
Monitoring Real-Time Threat Detection Continuous vulnerability scanning and real-time threat monitoring across all infrastructure and applications.
Development Secure SDLC Every code change is peer reviewed. Security requirements are integrated from the first line of code, not bolted on at the end.
Get the full picture

Questions about our security posture?

Our team is happy to walk through our security documentation, answer vendor questionnaires, or arrange a technical deep-dive for your firm's security team.

Request security docs Book a demo