Security

Effective March 23, 2026. This page describes how ClauseMinds approaches these topics for transparency. It is not legal advice; have counsel review for your organization.

Overview

ClauseMinds is built for teams that handle sensitive contracts. We design for strong tenancy boundaries, traceable access, and defense in depth. This page summarizes our security posture at a high level. For how we handle personal data, see our Privacy Policy.

Data isolation and access control

The product is structured around workspaces. Users access contracts, obligations, and settings only within workspaces where they are members, enforced by the application and API layers. Role-based permissions limit administrative actions such as billing, team management, and notification configuration where those features are enabled.

Deployment shape affects where primary data resides: the standard product runs on ClauseMinds-managed infrastructure; managed private deployment uses a dedicated ClauseMinds-operated stack; customer-owned deployment (Enterprise) runs in cloud projects your organization controls, such as your Supabase database and storage together with aligned app hosting.

Encryption and transport

Data in transit is protected using TLS for browser and API traffic. Stored customer content and metadata rely on the protections provided by our hosting and storage providers (for example encrypted object storage where configured).

Authentication

Customer authentication is typically provided through a managed identity provider (for example Supabase Auth). We recommend customers enforce strong passwords, SSO where available, and least-privilege workspace membership.

Application security

We apply common secure-development practices, including:

  • Scoped authorization checks on sensitive reads and writes.
  • Validation of uploads (type, size) to reduce abuse and malicious files.
  • Structured logging with care to avoid unnecessary exposure of contract content.
  • Dependency maintenance and review of security-relevant changes.

Backups and availability

Database and infrastructure availability and backup practices depend on your deployment (for example managed Postgres and storage from our cloud providers). Enterprise deployments can align retention and recovery objectives in a separate agreement.

Subprocessors

The Service may rely on subprocessors for hosting, authentication, email delivery, analytics, and payments. Customers should review vendor documentation for their environment and our Privacy Policy for data handling.

Your responsibilities

Customers play an important part in security:

  • Maintain control of user accounts and remove access when people leave.
  • Classify and permission contract data according to internal policy.
  • Use supported browsers, keep devices patched, and protect session tokens.
  • Report suspected incidents promptly using the contact channel below.

Reporting vulnerabilities

If you believe you have found a security vulnerability in the Service, please contact us with a description and reproduction steps. We ask that you avoid disruptive testing (for example no denial-of-service against production) and give us reasonable time to remediate before public disclosure.

Contact

Security questions or incident reports: use our contact page.

    Security