Data security with Lexa

ISO 27001
Compliance with information security best practices.
Physical security
24/7 surveillance and strict access controls.
Cyber protection
Advanced firewall and intrusion detection systems.
Encryption
Data encrypted in transit and at rest with AES-256.
Data retention policy
- Customer data retention
Customer data is kept only as long as is necessary for translation and invoicing purposes.
- Deleting translation data
Raw translation data is deleted from our servers immediately after translation.
- Deleting payment data
Payment data is deleted from our servers 30 days after invoicing, in compliance with PCI DSS security regulations.

Secure authentication
Multi-factor
For added security, Lexa offers the option of two-factor authentication. This further secures your account by requiring an additional verification step, such as a unique code sent to your phone, when logging in.
Access control
Our advanced access control system enables large organizations to manage user authorizations with precision. Each user can be assigned to specific groups, offering personalized access to different elements of the platform.

Monitoring
- Regular audits
Regular audits of our security systems are carried out by independent, in-house experts. This ensures that our security measures meet the highest standards, and that any potential weaknesses are identified and corrected.
- 24/7 surveillance
Our security team is available 24/7 to actively monitor our systems and identify potential threats or anomalies. Advanced monitoring tools enable us to detect suspicious activity and respond rapidly to security incidents.
Disaster recovery plan
A comprehensive disaster recovery plan is in place to guarantee continuity of operations in the event of a breakdown or security incident. Frequent back-ups of our data are carried out, and a redundant infrastructure is available to ensure uninterrupted operation of our services.
