Security built for
attorney-client privilege
Legal data is among the most sensitive in the world. FRITH's security posture is designed around the assumption that every piece of data is privileged and confidential.
Security architecture
Eight layers of security protecting your firm's data and your clients' confidentiality.
Encryption at rest
All data stored in FRITH's Supabase PostgreSQL database is encrypted at rest using AES-256. File attachments and documents stored in Supabase Storage are encrypted at the object level.
Encryption in transit
All data transmitted between clients and FRITH servers is protected by TLS 1.2 or higher. HTTPS is enforced on all endpoints with HSTS headers. WebSocket connections for real-time features are also TLS-encrypted.
Infrastructure — Supabase
FRITH's database and storage layer runs on Supabase, which operates on AWS infrastructure with SOC 2 Type II certification. Database instances are single-tenant by design for Enterprise customers.
Access controls
Row-level security (RLS) policies enforce data isolation between organisations at the database layer. Application-level role-based access control (RBAC) restricts feature access by user role and subscription tier.
Audit logging
All sensitive actions — login attempts, data exports, permission changes, AI queries, and billing events — are logged with timestamp, user ID, and IP address. Audit logs are immutable and retained for 12 months.
Incident response
FRITH maintains a documented incident response plan with defined severity levels, escalation paths, and notification timelines. Critical incidents trigger immediate customer notification within 24 hours.
Backup & recovery
Point-in-time recovery is enabled on all database instances with daily snapshots retained for 30 days. Disaster recovery objectives: RPO < 1 hour, RTO < 4 hours.
Data residency
Customer data is stored in the AWS region selected at account creation. FRITH supports US (us-east-1) and UK/EU (eu-west-2) data residency to meet GDPR and data sovereignty requirements.
Certifications & compliance
Current status and roadmap for third-party security certifications.
Bring Your Own Key (BYOK)
FRITH's BYOK model ensures AI features run under your own data governance — not ours.
Responsible disclosure
If you discover a security vulnerability in FRITH, please report it responsibly. We commit to acknowledging reports within 24 hours and providing a resolution timeline within 5 business days.
Report a vulnerabilityNeed a security review or DPA?
Enterprise customers can request our full security documentation, penetration test reports, and Data Processing Agreement.