Articles on: Compliance and Security

Data and Sub-Processors

Juristic uses purposefully selected vendors and sub processors. When you use our platform, the following sub processors may process personal data. Please note that Enterprise customers have the option to choose or request implementation of other vendors, depending on their needs. Specific data processing agreements can be agreed to.

Juristic processes data on behalf of our customers, including personal data, and also for own purposes (only statistical data). We process the following types of personal data:

KeyType
A: End User InformationThis type of information regards the end user, for example an attorney working at a customer law firm. We process email addresses, employment information (such as place of employment), names and statistical data (such as activity timestamps and IP addresses, although most customers use a VPN with a fixed IP address) and use this information to log the user in and provide access to the platform, including necessary functionality
B: Client or Case DataThis type of information regards the client of the law firm, such as names or other personal information. It depends on what the end user uploads but may include sensitive or special categories of personal data, such as health information or criminal records. We refer to Privacy Principles


For the provision of access to the Juristic platform, Juristic uses these sub-processors of personal data - for a full overview, see the link below:

NameLocationHQSub processorsPurpose and types of personal data processedCommentsDPA
3DS Outscale SASFranceFranceN/A3DS Outscale stores our data at rest, which is done in a relational format in a MySQL database. As such, 3DS Outscale processes both End User Information and Client or Case Data-Yes
Auth0, Inc.Germany or IrelandUSAAWSAuth0 provides secure authentification of end users and only processes emails and names of the customer end users (End User Information). This data is most often publicly availableEU SCCs. Risk assessment has been performed and is available per request.Yes
Compaya A/SDenmarkDenmarkTeam.blue Denmark A/S, Rackhosting ApSCompaya provides part of our sharing functionality and may - as such - process End User Information and Client or Case Data, but only the telephone number of the person the workspaces are shared with-Yes
Cloudflare, Inc.Germany or IrelandUSAAWSCloudflare provides security measures to protect the platform from attacks. It processes only IP addresses of the customer end users (End User Information). This data is most often fixed via VPNsEU SCCs. Risk assessment has been performed and is available per request.Yes
Crisp IM SASFranceFranceDigital OceanCrisp IM is our support chat software and may process both End User Information and Client or Case Data, however, only the latter when such data is provided to support agents manually-Yes
Scaleway S.A.S.FranceFranceN/AScaleway processes both End User Information and Client or Case Data in order to provide intelligent document processing for Juristic Timeline.-Yes
Scalingo SASFranceFrance3DS Outscale SASScalingo is our PaaS and processes data in transit, essential for our development. Scalingo processes both End User Information and Client or Case Data.-Yes
ScanSpan SL (Mandaa)DenmarkSpainN/AScanSpan provides part of our sharing functionality and may - as such - process End User Information and Client or Case Data, but only the email address and name of the person the workspaces are shared with-Yes


We have created risk assessments of each vendor which are available for our customers per request. If you are interested in becoming a customer and need this information, please contact Christian Hjortshøj via ch@juristic.io.

Most sub-processors can be disabled for customers per request.

We refer to this diagram to understand the way our data flows in our platform.

Please use the password: l0lv7fqdy - but please note that you must be logged out of our application for the diagram to work. If you are logged in, please log out first.

No ownership rights of data are transferred and Juristic is responsible for data processed by our suppliers. However, sub-processors may use metadata and statistical data for their own purposes. This data is limited to End User Information - and only if the services are used. For example, if the sharing functionality is not used, then ScanSpan SL or Compaya A/S will not receive any information. The information will be used for development, optimisation and support - and is covered by the agreement between Juristic and our customers.

We refer to Application Security and Testing for a general introduction to our risk assessments.

Updated on: 20/08/2024