Learn more about our security measures

Your data is protected with advanced technology and industry-grade practices

Rigorous security
standards

All data submitted to or generated with
Kelsen undergoes a level of professional
security controls that far surpasses
that of any consumer-facing language models.

Data privacy: our primary concern

To ensure an industry-leading level of data privacy compliance, we have partnered with Private AI to deploy their cutting- edge machine learning technology to ensure that all personally identifiable information is kept under lock and key and is never viewed any language model.

User data is encrypted at all times

Data is encrypted in transit and at rest
with AES 256-bit professional-grade
encryption protocols to ensure that user data is only viewable by the user. Not even Kelsen can access user data.

FAQs

All the information you need to navigate our services, policies, and legal compliance with confidence.

How is sensitive and personally-identifiable information handled by Kelsen?

We go to considerable lengths to keep user data safe.

Kelsen has partnered with Private AI, to deploy their cutting-edge machine learning identification technology. This model relies on the latest advancements in machine learning to identify personally-identifiable information based on context, understanding text in a way that is similar to humans. This technology identifies over 55 different types of direct and quasi-identifiers in 49 different languages.

Importantly, this identification model is hosted on Kelsen’s server infrastructure, which means that the data never gets transferred to Private AI or any third parties.

To ensure informational security, all written data submitted to or produced in Kelsen software:

(i) is verified for over 55 different types of personally-identifiable information;

(ii) any personally-identifiable information found in the input data (such as names, dates, document numbers, addresses, countries, email, IP, monetary values, etc.) is automatically extracted and substituted for context-appropriate pseudonyms;

(iii) the correspondence keys linking the pseudonyms to the original information are kept on-premise, in an encrypted repository that is only accessible to the user and these data are never transferred to a language model; and

(iv) the pseudo-anonymized data is only re-identified with the original personally identifiable information in the last leg of the text generation process, after the output text has been generated by the language model, and before the data is served back to the user.

Presently, Kelsen employs a mixture of proprietary and custom-builds of open source neural networks and large language models, hosted and operated by Kelsen.

No. We do not use client data to fine-tune or train our base model, although clients are free to safely finetune their dedicated instances of our models with their own data.

Client fine-tuning of their respective instances is strictly limited to the client’s own instance and does not communicate with is visible to, or can otherwise benefit Kelsen’s base models or the model instances of any other client or third party.

Moreover, user’s prompts (inputs) and completions (outputs), embeddings and training data:

(i) are NOT available to other customers;

(ii) are NOT available to Kelsen or any third parties;

(iii) are NOT used to improve language models deployed by Kelsen or any third parties;

(iv) are NOT used to improve products or services provided by Kelsen or third parties;

All data is encrypted in transit and at rest in our system.

Kelsen encrypts all data in transit via SSL/TLS (Transport Layer Security) with the 256-bit AES (Advanced Encryption Standard) protocol, meeting industry standards for externally-facing systems.

AES 256-bit encryption with a rotational KMS (Key Management Service) is used to protect data at rest.

Encryption keys, including the right to revoke said keys, may be assigned to the company-designated administrators.

keys will be stored in an encrypted backup vault.

Kelsen Draft is a cloud-based application.

User data is hosted and stored in Kelsen’s cloud infrastructure, in servers located in or near to the user’s physical location, in compliance with national data residency regulations, such as GDPR, PIPEDA, LGPD, etc.

For high-volume clients, cloud infrastructure and hosting may be changed to a specific cloud service or the client’s own cloud infrastructure, on a case-by-case basis, to accommodate specific requirements and data management policies.

Kelsen Logo

Sign up to our waitlist
and get early access
to Kelsen DraftTM

Starting on the 28th of August, 2023, users will be gradually onboarded to ensure capacity and the best possible user experience.

If you are interested in revolutionizing the legal drafting experience and becoming an early user, please join our waitlist

Expect to hear back from us soon!