Guides & Studies

Security & Privacy Questions to Ask Your Contract Technology Vendor

Sign up for your free download

By submitting this request, you agree to Litera and Kira Systems using your contact information to communicate information about Kira Systems’ solutions and Litera services and offerings. We will likely need to transfer your data to locations outside the jurisdiction in which you provide it or where you are viewing our website. You may review our privacy policy or opt-out by contacting Kira Systems.

Today’s contract technologies help organizations create, maintain, and analyze the contents of their contracts on a scale that was unthinkable just a few years ago. But the digital transformation of those workflows creates new risks for security and privacy breaches.

This guide describes several types of security and privacy threats to contract data, and the state-of-the art practices, techniques, and technologies used to combat those threats. It also serves as a checklist when speaking with technology vendors about their protection of contract data so that buyers understand:

  • Protections against security threats to a vendor’s systems in the form of unauthorized access and malware.
  • Protections against the vulnerabilities of a vendor’s system to attacks that are directed at the vendor’s employees.
  • Privacy protections focused on protecting data in the underlying documents, ensuring that sensitive data in contracts is not available to third parties, even when models trained on the data are shared with them.

Trusted by the world's largest Law, Commercial, IT and Professional Service firms
Allen & Overy
DLA Piper
Freshfields
Clifford Chance
Latham & Watkins
Goodwin