Security Policy

Our Commitment to Security

Security is foundational to BiLex. We implement industry-leading practices to protect your sensitive legal documents.

Last updated: January 2026

Security Practices

Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256)

Access Control

Role-based access with secure token authentication

Data Retention

Documents automatically deleted after processing unless saved

Infrastructure

Hosted on enterprise-grade cloud with SOC 2 compliance

Vulnerability Disclosure

We appreciate the security research community's efforts. If you discover a vulnerability, please report it responsibly.

What to Include

  • Detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Your contact information

Our Response

Initial response: 48 hours
Status update: 7 days

Testing Scope

In Scope

  • bilex.datanexus.ae
  • API endpoints (/api/*)
  • Authentication mechanisms
  • Document processing pipeline
  • Data storage and encryption

Out of Scope

  • Third-party services
  • Social engineering attacks
  • Physical security testing
  • Denial of service attacks
  • Spam or rate limit testing

Contact