Privacy with Lexa
Commitments to confidentiality
Strict protocols
All sensitive documents and data are treated confidentially.
No preservation
Files are only kept for the duration of processing.
Complete control
The user decides how their documents are stored and accessed.
Processing of sensitive data
Data separation
Your documents are processed separately and securely, without ever being mixed with other data. This ensures that each document is protected individually and that sensitive information is not compromised.
Not for use in training
Your documents are never used to improve our translation algorithms. We do not collect or store any data for machine learning purposes. Your privacy is our top priority.
Automatic deletion
The data is automatically deleted after the translation has been processed. However, you have the option to keep your documents if you wish. You have complete control over how long your data is stored and who has access to it.
Lexa's commitments
Data protection
The security and confidentiality of your information are our top priorities.
GDPR compliance
We strictly comply with GDPR requirements for all our users.
Transparency
We clearly communicate how we process and protect your data.
Confidentiality agreements
NDA for all employees
All our employees and review experts are bound by strict non-disclosure agreements, ensuring the confidentiality of your sensitive information. These agreements cover all aspects of confidentiality, including the use, disclosure, and storage of sensitive data.
Legal translation experts
Specialized translators involved in human revision are also subject to non-disclosure agreements, ensuring the security of your sensitive documents. Each translator is required to adhere to the highest standards of confidentiality and data security.
Continuing education
Our teams undergo regular training on the management of sensitive data, enabling them to understand security protocols and applicable laws. These training sessions cover specific aspects of confidentiality agreements, best practices in data security, and data protection laws.
Access management
Advanced access control
Detailed management of permissions for each user.
User groups
Creation of groups with specific access rights.
User tracking
Complete transparency regarding document consultations and downloads.