LEAP Information Security Policy

LEAP Legal Software.

Cloud Infrastructure

LEAP’s cloud infrastructure is maintained by the industry leading cloud platform provider, Amazon Web Services (AWS), in multiple unmarked facilities within the Sydney region.

The terms of agreement between LEAP & AWS, are here: aws.amazon.com/agreement

AWS has achieved a substantial amount of certification and compliance in industry standards, which recognise best practices in Information Security.

For a full listing of AWS certification and compliance, visit aws.amazon.com/compliance

Security Controls

LEAP utilises multiple layers of security controls (software, physical and process based) to protect our client data. This includes, but not limited to;

  • Local & Network Firewalls
  • Web Application Firewalls
  • Intrusion Detection & Prevention Systems
  • Multivendor Anti-Virus
  • Application White Listing
  • DDoS Throttling Services
  • Access Control Lists
  • Security Patch Management
  • ITIL Framework (release/incident/change)
  • Identity and Access Management
  • Centralised Log Management
  • Symmetric and Asymmetric Encryption systems
  • Two Factor Authentication
  • Secure Code reviews
  • Separation of Duties
  • Data Loss Prevention
  • Vulnerability Assessment
  • Anomaly Detection
  • Externally commissioned penetration testing
  • Externally commissioned audits
  • Remote Monitoring & Alerting

Data Encryption

Each LEAP application is accessed via HTTPS using Transport Layer Security (TLS). TLS is a cryptographic protocol designed to protect information transmitted over the internet, against eavesdropping, tampering, and message forgery.

Once client data reaches LEAP's cloud infrastructure, all information is then encrypted at rest, using AES-256, military grade encryption. This is done to protect client information in the event a LEAP server is compromised by an authorised party.

Employee Vetting

All LEAP staff who have direct access to our cloud infrastructure, must go through an extensive vetting process, which includes police background checks, to ensure only bona fide team members are selected to look after our core platform.

Service Availability

LEAP has been designed to be a highly available, active-active solution. LEAP services are split over multiple AWS datacentres within the Sydney region. In the event of one data centre going offline in a disaster scenario, the second data centre continues to serve data with minimal, if any, service interruption.

LEAP’s service is designed to scale up as more clients use it at peak times, and then scale down at low times. This scaling allows LEAP to mitigate external attacks trying to flood our system resources.

Data Ownership

The data contained in LEAP remains the property of the licensed subscriber. If the subscriber ends their agreement with LEAP, LEAP will retain the data for a minimum of seven (7) years, before having it destroyed.

At any time during the post active subscription, seven (7) year period, a subscription can be reactivated to gain access to the client data. Unless directed by the customer to remove all copies of data, backups of the data may remain in LEAP archives as part of our standard retention policies.

Backup Policy

LEAP servers are backed up multiple times daily, weekly and monthly.

System Monitoring

LEAP is monitored 24hours a day, 7 days a week, 365 days a year.

Found a Vulnerability?

At LEAP, we strive to have the most secure solution we can. If you believe you’ve found a security vulnerability in our platform, please let us know on secure at leap.com.au.

Report a Data Breach

If you believe LEAP client information has become publicly available, outside of LEAP, please contact us immediately on secure at leap.com.au for validation.

LEAP has a duty of care of our client’s data. If a data breach occurs, we must notify affected clients immediately.

Firms using LEAP make more MONEY

Book your obligation free demonstration online today or call us for more information
1300 607 625.

REQUEST A FREE DEMO