Skip to main content

We have rebranded from Iqidis — meet Irys. A new identity for the future of legal work.

Security & Compliance

Enterprise security, built from the ground up.

Every layer of Irys is architected for enterprise-grade data protection. Your clients' confidences remain confidential.

Built by lawyers. Audited by experts. Trusted by enterprise legal teams.

SOC 2 Type IIISO 27001HIPAA ReadyGDPR AlignedCCPA Ready

The promise

Your data stays yours. Full stop.

We never store or train on your data. Every AI inference is stateless and containerized. Nothing is cached or retained after a session ends — by us or by our model providers.

No Training on Your Data

Customer content is never used to train any model — internal or third-party. Your work product remains yours.

Ephemeral Processing

AI inferences are stateless and containerized. Nothing is cached or retained after a session ends — by us or by our model providers.

Tenant Isolation

Every organization is hard-isolated. Workspaces and matters are segregated containers — never commingled, never pooled across clients.

Certifications & Standards

Audited. Certified. Compliant.

SOC 2 Type II

Audited & certified for availability, confidentiality, and integrity

ISO 27001

Information security management meets international standards

HIPAA Ready

Healthcare compliance controls for sensitive data

GDPR Aligned

Lawful basis, data minimization, and subject rights

CCPA Ready

California privacy rights: know, delete, opt-out

Security Architecture

Layers of protection at every level.

From access control to data transit to AI inference — every layer is designed to protect your clients' data.

Encryption at Every Layer

All data is encrypted in transit and at rest. Third-party model calls are stateless — vendor caching is disabled so nothing persists outside your tenant boundary.

  • TLS 1.2+ for all data in transit
  • AES-256 encryption at rest
  • Zero vendor-side data retention

Multi-Factor Authentication

MFA is enforced across all user sessions. Role-based access control ensures least-privilege access at every level of the organization.

  • MFA enforced for all accounts
  • Least-privilege role model (Org Admin, Matter Owner, Contributor)
  • SSO / SCIM for enterprise deployments

Session Controls & Audit

Inactive sessions are automatically terminated. Full audit trail tracks every action, access event, and change across the platform.

  • Automatic idle-session expiry
  • Complete audit trail — exportable for compliance
  • Hard tenant isolation — no data commingling

Architecture Before AI

RAG, OCR, and a matter-centric Knowledge Graph provide context first. AI models are only invoked for narrow inference — never as a general data store.

  • Matter-centric workspaces, never pooled
  • AI invoked only for narrow inference
  • Processing is ephemeral and containerized

Your Data Rights

You own your data. Always.

No Training

Customer content is never used to train any model.

Deletion on Demand

Delete your data at any time. All content is deleted or returned within 30 days of contract termination.

No Retention

Third-party model calls are stateless. Vendor caching is disabled.

Exportability

Content can be exported in standard formats (Word or PDF) at any time.

Built for legal

Privilege-safe by design.

Irys is not a general AI tool retrofitted for law. It was architected from day one for privilege, confidentiality, and professional responsibility. RAG, OCR, and a matter-centric Knowledge Graph provide context first. AI models are only invoked for narrow inference — never as a general data store.

Matter-centric workspaces, never pooledAI invoked only for narrow inferenceProcessing is ephemeral and containerizedArchitecture audited by Guidepost Solutions

From our Head of AI

Research and analysis from Devansh, Co-Founder & Head of AI at Irys.

Security you can trust.

Built by lawyers. Audited by experts. See Irys in action.