How Secure Is My Data with Logically?
We are committed to providing a secure and reliable experience for our users. We understand the importance of protecting your data and ensuring the privacy of your information. Our platform is built upon industry-leading technologies which incorporates the latest security best practices to safeguard your data.
Your data is yours alone. Our team does not access your files or usage data, and we never use your data to train our AI models.
Cloud Infrastructure
We use multiple industry-leading cloud providers: Google Cloud, Microsoft Azure, and MongoDB to host our data and serve website content. All of which have the highest and most comprehensive security compliance and certifications.
Our data center region is located within the US, and all our data processors are SOC 2 Type II compliant. You can read more about each provider below:
System Security
All sensitive data transmitted between our servers and your browser is encrypted using SSL/TLS encryption. This ensures that your data remains secure and confidential during transmission. In addition, all sensitive data is encrypted at rest.
Payments
We use Stripe to securely process payments. Stripe is a certified PCI Service Provider Level 1, the highest level of certification in the payments industry. You can read more about Stripe below:
Large Language Model (LLM)
We utilize a combination of LLMs from Microsoft, Google, OpenAI, and Anthropic to power our AI features. The LLMs we select to power our platform are highly vetted and are specifically designed to meet the highest standards of data protection and privacy. You can read more about each provider below:
Logically Security Handbook (Available Upon Request)
This handbook is made available upon request for enterprise clients. Please contact [email protected] to request access.
Enterprise Risk Management
Question: Is there a formalized risk governance plan approved by management that defines the Enterprise Risk Management program requirements?
Answer: Yes, a formalized risk governance plan exists and is detailed within the Logically Security Handbook.
Information Security Policy
Question: Is there a set of information security policies that have been approved by management, published, and communicated to constituents?
Answer: Yes, a formalized information security policy has been approved by management and is included in the Logically Security Handbook.
Asset and Information Management
Question: Is there a set of procedures for managing assets and information that have been approved by management, published, and communicated to constituents?
Answer: Yes, procedures for asset and information management are included within the Logically Security Handbook's information security policy section.
β