
Lexa: RGPD compliance
Explicit consent
We will only collect your data with your explicit consent and will clearly inform you of how it will be used. No data is processed without your prior consent.
Right to information
You have the right to know what personal data we collect and why. We provide clear and transparent information on the use of your information via our privacy policy.
Access and rectification
You can request access to and rectification of the personal data we hold about you at any time. You also have the right to know how this data is processed and for what purposes.
Right to erasure
You may request the deletion of your personal data from our systems at any time. Once your request has been approved, we will completely and permanently delete your information.
Data portability
You have the right to receive your personal data in a structured, commonly used and machine-readable format, so that it can be transferred to another organization if necessary.
Treatment limitation
You may request that the processing of your data be restricted in certain circumstances, in particular if you dispute the accuracy of the data or if you need the data to be retained for legal purposes.
Data transfer outside the EU
- Standard contractual clauses
Use of clauses approved by the European Commission for transfers outside the EU.
- Compliant countries

Data security
Encryption
Your data is encrypted both in transit and at rest. This means that your information is protected during transmission to our servers and while stored on our systems. We use state-of-the-art encryption algorithms to guarantee the confidentiality and integrity of your data.
Restricted access
We implement strict access controls to protect your information. Only authorized Lexa personnel can access your data and only for specific and legitimate purposes. We follow strict security protocols to prevent unauthorized access to your information.
Regular audits
Regular security audits are carried out to ensure the ongoing security of our infrastructure and the data stored on it. These audits enable us to quickly identify and correct potential security flaws, thus guaranteeing optimum protection for your data.

Data breach
Detection
Continuous monitoring to detect data breaches.
Fast notification
Report within 72 hours of discovery.
Intervention plan
Immediate implementation of corrective measures.
Minimal data processing
Targeted collection
Limited conservation
No superfluous data
No non-essential information is stored.
Lexa commitments
Data protection
The security and confidentiality of your information are our top priorities.
RGPD Compliance
We strictly adhere to RGPD requirements for all our users.
Transparency
We clearly communicate how we process and protect your data.