The Liggett Group logo
The Liggett Group
Enterprise software & AI
Draft — Subject to legal review

Security Overview

Last updated: April 2026

This page provides a plain-language overview of how The Liggett Group protects your data on the TLG Claims Validation Platform. This is not a formal security certification document — it is intended to help you understand our security practices and make informed decisions about using the Platform.

1. Encryption

In transit. All communication between your browser and the Platform is encrypted via HTTPS (TLS). We use a reverse proxy with automatic certificate management to ensure encryption is always active.

Internal services. Communication between our internal services uses Tailscale, which provides WireGuard-based encrypted tunnels. This includes communication between the orchestrator, evidence retrieval services, and GPU processing infrastructure. All internal traffic is encrypted and authenticated — services are not exposed to the public internet.

2. Tenant Isolation

The Platform uses PostgreSQL Row-Level Security (RLS) to enforce tenant isolation at the database level. This means:

3. Authentication

The Platform supports multiple authentication methods, all designed to be secure by default:

4. Document Handling

We take the security of your uploaded documents seriously:

5. AI Processing Infrastructure

The Platform uses AI models to extract claims, select evidence, and score evidence quality. Here is how we handle AI processing securely:

6. Access Controls

7. Data and AI Training

Your documents are not used to train AI models. We do not use uploaded document content, scorecard results, or any user data to train, fine-tune, or improve AI models.

Failed AI call logs. When an AI call fails during processing, we log diagnostic data that includes extracted claim text and evidence snippets. These logs are used exclusively for product quality improvement — identifying failure patterns, improving reliability, and debugging issues. These logs do not contain personal information (names, emails, account details). They contain only the claim and evidence data that was part of the failed operation.

8. Monitoring and Incident Response

9. Security Questions

If you have security questions, need additional information for a vendor assessment, or want to report a security concern, please contact us at:

The Liggett Group
Email: info@theliggettgroup.com
Website: www.theliggettgroup.com

We are happy to discuss our security practices in more detail and answer specific questions relevant to your organization's security review process.