Contact
dataLayer = []; (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KG2FX43');

Security & Compliance

L+R utilizes enterprise-grade best practices to protect our customers’ data.

Process Overview

Continuous Security Control Monitoring
L+R uses Drata’s automation platform to continuously monitor 100+ internal security controls across the organization against the highest possible standards. Automated alerts and evidence collection allows L+R to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization.

 



 

Employee Trainings
Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

 

Penetration Tests
L+R works with industry leading security firms to perform annual network and application layer penetration tests.

 

Secure Software Development
L+R utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

 

Data Encryption
Data is encrypted both in-transit using TLS and at rest.

 

Vulnerability Disclosure Program
If you believe you’ve discovered a bug in L+R’s security, please get in touch at security@levinriegner.com. Our security team promptly investigates all reported issues.