Data security with Lexa

The security of your data is our top priority. Your sensitive data is protected by state-of-the-art technology and rigorous protocols to guarantee total confidentiality.

ISO 27001

Compliance with information security best practices.

Physical security

24/7 surveillance and strict access controls.

Cyber protection

Advanced firewall and intrusion detection systems.

Encryption

Data encrypted in transit and at rest with AES-256.

Data retention policy

Customer data is kept only as long as is necessary for translation and invoicing purposes.

Raw translation data is deleted from our servers immediately after translation.

Payment data is deleted from our servers 30 days after invoicing, in compliance with PCI DSS security regulations.

Secure authentication

Multi-factor

For added security, Lexa offers the option of two-factor authentication. This further secures your account by requiring an additional verification step, such as a unique code sent to your phone, when logging in.

Access control

Our advanced access control system enables large organizations to manage user authorizations with precision. Each user can be assigned to specific groups, offering personalized access to different elements of the platform.

Monitoring

Regular audits of our security systems are carried out by independent, in-house experts. This ensures that our security measures meet the highest standards, and that any potential weaknesses are identified and corrected.

Our security team is available 24/7 to actively monitor our systems and identify potential threats or anomalies. Advanced monitoring tools enable us to detect suspicious activity and respond rapidly to security incidents.

Disaster recovery plan

A comprehensive disaster recovery plan is in place to guarantee continuity of operations in the event of a breakdown or security incident. Frequent back-ups of our data are carried out, and a redundant infrastructure is available to ensure uninterrupted operation of our services.