Skip to main content
FRITH
Trust Centre

Security built for
attorney-client privilege

Legal data is among the most sensitive in the world. FRITH's security posture is designed around the assumption that every piece of data is privileged and confidential.

Security architecture

Eight layers of security protecting your firm's data and your clients' confidentiality.

Encryption at rest

All data stored in FRITH's Supabase PostgreSQL database is encrypted at rest using AES-256. File attachments and documents stored in Supabase Storage are encrypted at the object level.

Encryption in transit

All data transmitted between clients and FRITH servers is protected by TLS 1.2 or higher. HTTPS is enforced on all endpoints with HSTS headers. WebSocket connections for real-time features are also TLS-encrypted.

Infrastructure — Supabase

FRITH's database and storage layer runs on Supabase, which operates on AWS infrastructure with SOC 2 Type II certification. Database instances are single-tenant by design for Enterprise customers.

Access controls

Row-level security (RLS) policies enforce data isolation between organisations at the database layer. Application-level role-based access control (RBAC) restricts feature access by user role and subscription tier.

Audit logging

All sensitive actions — login attempts, data exports, permission changes, AI queries, and billing events — are logged with timestamp, user ID, and IP address. Audit logs are immutable and retained for 12 months.

Incident response

FRITH maintains a documented incident response plan with defined severity levels, escalation paths, and notification timelines. Critical incidents trigger immediate customer notification within 24 hours.

Backup & recovery

Point-in-time recovery is enabled on all database instances with daily snapshots retained for 30 days. Disaster recovery objectives: RPO < 1 hour, RTO < 4 hours.

Data residency

Customer data is stored in the AWS region selected at account creation. FRITH supports US (us-east-1) and UK/EU (eu-west-2) data residency to meet GDPR and data sovereignty requirements.

Certifications & compliance

Current status and roadmap for third-party security certifications.

SOC 2 Type I
Complete
SOC 2 Type II
In Progress
GDPR Compliance
Complete
ISO 27001
Roadmap
Cyber Essentials Plus (UK)
In Progress
HIPAA (for health-law practices)
Roadmap

Bring Your Own Key (BYOK)

FRITH's BYOK model ensures AI features run under your own data governance — not ours.

Bring your own API key for OpenAI, Anthropic, Groq, Gemini, or self-hosted Ollama
AI queries are sent directly from FRITH to your chosen provider using your key
FRITH never stores your API key in plain text — keys are encrypted with AES-256 before storage
No FRITH-operated AI model is trained on your firm's data or client matters
Enterprise customers can use Ollama to run AI entirely within their own infrastructure

Responsible disclosure

If you discover a security vulnerability in FRITH, please report it responsibly. We commit to acknowledging reports within 24 hours and providing a resolution timeline within 5 business days.

Report a vulnerability

Need a security review or DPA?

Enterprise customers can request our full security documentation, penetration test reports, and Data Processing Agreement.