Trust
Personal-injury work concentrates exactly the data nobody should leak, medical records, settlement amounts, opposing-counsel correspondence, client SSNs in intake forms. Here's how Lexboard handles it.
§I · Data isolation
The structural fix, not the marketing line.
Every record in Lexboard carries a firm_id. Postgres row-level security is enabled on every table; every read and every write is filtered against the caller's firm, sourced from a JWT claim, not from a request parameter. A developer who forgets a WHERE firm_id = ?in application code still cannot see another firm's data.
Service-role access is restricted to API routes that go through a firm-context helper. Background jobs (cron, webhook handlers, recurring task spawners) carry the firm context explicitly, no row leaves a firm boundary.
Cross-tenant integration tests run on every deploy: signed in as Firm A, the test suite asserts zero rows returned from Firm B fixtures. CI gates the deploy.
§II · Encryption
At rest, in transit, and in storage.
In transit
At rest, database
At rest, file storage
Secrets
Passwords
§III · Access & permissions
Five firm roles, per-case scoping, audit log on every change.
Firm-wide roles. Admin, attorney, paralegal, staff, read-only. Each role gates a different set of capabilities , only attorneys can finalize a settlement; only admins can change firm settings or modify roles.
Per-case access. By default everyone in the firm sees every case. Toggle a firm-level setting to flip the default to assignees-only. Override per case, sensitive matters can be locked to assigned team only, even when the firm default is open.
Per-user override. A paralegal can be marked all-cases-visible regardless of firm default, or assignees-only regardless. Financial visibility (fees, costs, settlement amounts) is its own per-user toggle.
Audit log. Every permission change, every phase-gate override, every email sent, every document generated writes an immutable row with actor, timestamp, before/after JSON, and IP. Search the audit feed by entity or by user.
§IV · Compliance posture
What we are. What we're aligned with. What's on the roadmap.
SOC 2 Type II
HIPAA
ABA Model Rule 1.6 (confidentiality)
State bar cloud-storage opinions
GDPR / CCPA
§V · Continuity
What happens when something breaks.
Uptime target 99.9%. Status page at status.lexboard.net with incident postmortems within 5 business days.
Backups. Database point-in-time recovery up to 7 days. Daily encrypted backups retained 30 days. File storage versioned for 30 days.
Disaster recovery. RPO 1 hour, RTO 4 hours. DR runbook tested quarterly.
Vendor exit. Full firm-data export available from the admin panel: cases, clients, documents, communications, ledger, and audit log as JSON + CSV. No lock-in.
We'll send the full security questionnaire (DDQ + SOC 2 update + data-flow diagram) to your firm's IT or compliance lead. Emailsecurity@lexboard.net.
Send a description and reproduction steps to security@lexboard.net. We acknowledge within one business day. No bounty program yet — we send a bottle of bourbon and your name on the trust page.