Share via


LawToolBox

Publisher Attestation: The information on this page is based on a self-assessment report provided by the app developer on the security, compliance, and data handling practices followed by this app. Microsoft makes no guarantees regarding the accuracy of the information.

Last updated by the developer on: April 12, 2023

General information

Information provided by LawToolBox.com,Inc. to Microsoft:

Information Response
App name LawToolBox
ID WA104381656
Office 365 clients supported Microsoft Teams
Partner company name LawToolBox.com,Inc.
Company's website https://www.lawtoolbox.com
App's Terms of Use https://www.lawtoolbox.com/customersupport/2019/LawToolBox_...
Core functionality of the app Manage Deadlines and Search for Files with our Microsoft 365 Integrations for Legal
Company headquarter location United States of America
App info page https://www.lawtoolbox.com/office365
What is the hosting environment or service model used to run your app? Iaas
Which hosting cloud providers does the app use? Azure

Questions

Questions or updates to any of the information you see here? Contact us!

How the app handles data

This information has been provided by LawToolBox.com,Inc. about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.

Information Response
Does the app or underlying infrastructure process any data relating to a Microsoft customer or their device? Yes
What data is processed by your app? email, UPN, name, groupid, group email, tenantid, user object id
Does the app support TLS 1.1 or higher? Yes
Does the app or underlying infrastructure store any Microsoft customer data? Yes
What data is stored in your databases? email, UPN, name, groupid, group email, tenantid, user object id
If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored? United States of America
Do you have an established data rentention and disposal process? Yes
How long is data retained after account termination? Less than 90days
Do you have an established data access management process? Yes
Do you transfer customer data or customer content to third parties or sub-processors? No

Questions

Questions or updates to any of the information you see here? Contact us!

Information from the Microsoft Cloud App Security catalog appears below.

Information Response
Do you perform annual penetration testing on the app? No
Does the app have a documented disaster recovery plan, including a backup and restore strategy? Yes
Does your environment use traditional anti-malware protection or application controls? ApplicationControls
Do you have an established process for indentifying and risk ranking security vulnerabilities? Yes
Do you have a policy that governs your service level agreement (SLA) for applying patches? No
Do you carry out patch management activities according to your patching policy SLAs? No
Does your enviroment have any unsupported operating systems or software? No
Do you conduct quarterly vulnerability scanning on your app and the infastructure that supports it? Yes
Do you have a firewall installed on your external network boundary? Yes
Do you have an established change management process used to review and approve change requests before they are deployed to production? Yes
Is an additional person reviewing and approving all code change requests submitted to production by the original developer? Yes
Do secure coding practices take into account common vulnerability classes such as OWASP Top 10? Yes
Multifactor Authentication (MFA) enabled for: CodeRepositories, DNSManagement
Do you have an established process for provisioning, modification, and deletion of employee accounts? Yes
Do you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app? Yes
Do you have event logging set up on all system components supporting your app? Yes
Are all logs reviewed on a regular cadence by human or automated tooling to detect potential security events? Yes
When a security event is detected are alerts automatically sent to an employee for triage? Yes
Do you have a formal information security risk management process established? Yes
Do you have a formal security incident response process documented and established? Yes
Do you report app or service data breaches to supervisory authorities and individuals affected by the breach within 72 hours of detection? Yes

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Does the app comply with the Health Insurance Portability and Accounting Act (HIPAA)? N/A
Does the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)? N/A
Does the app comply with Service Organization Controls (SOC 1)? N/A
Does the app comply with Service Organization Controls (SOC 2)? No
Does the app comply with Service Organization Controls (SOC 3)? No
Do you carry out annual PCI DSS assessments against the appand its supporting environment? N/A
Is the app International Organization for Standardization (ISO 27001) certified? No
Does the app comply with International Organization for Standardization (ISO 27018)? No
Does the app comply with International Organization for Standardization (ISO 27017)? No
Does the app comply with International Organization for Standardization (ISO 27002)? No
Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant? No
Does the app comply with Family Educational Rights and Privacy Act (FERPA)? N/A
Does the app comply with Children's Online Privacy Protection Act (COPPA)? N/A
Does the app comply with Sarbanes-Oxley Act (SOX)? Yes
Does the app comply with NIST 800-171? N/A
Has the app been Cloud Security Alliance (CSA Star) certified? No

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Do you have GDPR or other privacy or data protection requirements or obligations (such as CCPA)? Yes
Does the app have an external-facing privacy notice that describes how it collects, uses, shares, and stores customer data? Yes
Privacy Policy URL https://www.lawtoolbox.com/privacy-policy/
Does the app perform automated decision making, including profiling that could have a legal effect or similar impact? No
Does the app process customer data for a secondary purpose not described in the privacy notice (i.e. marketing, analytics)? No
Do you process special categories of sensitive data (i.e. racial or ethnic origin, political opinion, religious or philosophical beliefs, genetic or biometric data, health data) or categories of data subject to breach notification laws? No
Does the app collect or process data from minors (i.e., individuals under the age of 16)? No
Does the app have capabilities to delete an individual's personal data upon request? Yes
Does the app have capabilities to restrict or limit the processing of an individual's personal data upon request? Yes
Does the app provide individuals the ability to correct or update their personal data? Yes
Are regular data security and privacy reviews performed (for example, Data Protection Impact Assessments or privacy risk assessments) to identify risks related to the processing of personal data for the app? N/A

Questions

Questions or updates to any of the information you see here? Contact us!

Information Response
Does your application integrate with Microsoft identity platform (Microsoft Entra ID) for single-sign on, API access, etc.? Yes
Have you reviewed and complied with all applicable best practices outlined in the Microsoft identity platform integration checklist? Yes
Does your app use the latest version of MSAL (Microsoft Authentication Library) or Microsoft Identity Web for authentication? Yes
Does your app support Conditional Access policies? Yes
List the types of policies supported For greater control admin can implement app permissions
Does your app support Continuous Access Evaluation (CAE) No
Does your app store any credentials in code? No
Apps and add-ins for Microsoft 365 might use additional Microsoft APIs outside of Microsoft Graph. Does your app or add-in use additional Microsoft APIs? No

Data access using Microsoft Graph

Graph Permission Permission Type Justification Microsoft Entra App ID
Calendars.Read application This permission is used to access Microsoft 365 calendar of a user 2fa142be-31b5-4fda-bd37-591541b501aa
Calendars.ReadWrite application This permission allows users to retrieve their own calendar information. The end-user only has access can use the app to retrieve their own calendar information (the same information they could retrieve by opening their Outlook calendar) 2fa142be-31b5-4fda-bd37-591541b501aa
Group.ReadWrite.All application This permission is used so that normal user are not limited to and may set up more than 250 groups, also required for managing group members and owners. 2fa142be-31b5-4fda-bd37-591541b501aa
User.Read delegated This permission is required to read basic info of user (e.g., name, email, time zone) so that an admin can add accurate users to the system 2fa142be-31b5-4fda-bd37-591541b501aa
User.ReadWrite.All application This permission is used to read user related information from the directory and to permit end-users with access to the LawToolBox admin portal to add people to groups they are not members of. 2fa142be-31b5-4fda-bd37-591541b501aa
Calendars.ReadWrite delegated This permission allows users to retrieve their own calendar information. The end-user only has access can use the app to retrieve their own calendar information (the same information they could retrieve by opening their Outlook calendar) 6be25d92-7c0e-4b2f-829e-108766e095df
Contacts.ReadWrite delegated This permission is used to allow user to search Microsoft 365 Outlook contacts and add to contact management system - contacts are never automatically added 6be25d92-7c0e-4b2f-829e-108766e095df
Contacts.ReadWrite.Shared delegated This permission is used to allow user to search shared M365 contacts and add as a contact to our contact management system - contacts are never automatically added 6be25d92-7c0e-4b2f-829e-108766e095df
Directory.ReadWrite.All delegated This permission is required to read and write the group and user information. 6be25d92-7c0e-4b2f-829e-108766e095df
Files.ReadWrite delegated LawToolBox reads and writes files from Teams, Groups and OneDrive for meetings (if end-user revokes this permission it will prevent LTB from creating folders and files from templates and listing matter files in our apps) 6be25d92-7c0e-4b2f-829e-108766e095df
Group.ReadWrite.All delegated This permission is necessary to read the Teams API, create Teams, create Calendar events, create channels, and it is necessary for our one-click external file sharing feature. REQUIRED TO MANAGE GROUPS. 6be25d92-7c0e-4b2f-829e-108766e095df
Mail.Read delegated This permission is used to read PACER emails in outlook add-in to auto open that matter and also to read contacts from emails. If end-user revokes this permission they will not be able to add email contacts from emails in their inbox to our contact system 6be25d92-7c0e-4b2f-829e-108766e095df
Mail.Send delegated This permission is used to send emails as the user - for example the user can send themselves a matter deadline chart from themselves. 6be25d92-7c0e-4b2f-829e-108766e095df
MailboxSettings.ReadWrite delegated This permission is used to stamp an email with a label indicating it has been saved to the Group folder using the app 6be25d92-7c0e-4b2f-829e-108766e095df
Notes.ReadWrite.All delegated This permission allows users to save selected data - like case notes, deadline charts, or matter contacts - to a OneNote associated with the matter 6be25d92-7c0e-4b2f-829e-108766e095df
OnlineMeetings.ReadWrite delegated This permission is used to streamline creating and manage meetings and to suggest attendees using attendees roles 6be25d92-7c0e-4b2f-829e-108766e095df
People.Read delegated This permission is used to allow user to use Microsoft AI to search shared M365 contacts and add to LawToolBox contact management system and suggest people to add to the apps contact management system - we do not add any contacts automatically 6be25d92-7c0e-4b2f-829e-108766e095df
User.Read delegated This permission is required to read basic info of user (e.g., name, email, time zone) so that an admin can add accurate users to the system 6be25d92-7c0e-4b2f-829e-108766e095df
email delegated This permission allows app to read emails to enable the end-user to collect email contact info from emails in their inbox, this permission also allows the app to read emails with PACER information so app can open the related case by default using the PACER docket number 6be25d92-7c0e-4b2f-829e-108766e095df
profile delegated This is necessary for SSO authentication (LawToolBox doesn't ask for permission to write to your profile) THIS PERMISSION IS REQUIRED FOR USERS TO SIGN INTO LAWTOOLBOX APPS USING SINGLE SIGN ON AUTHORIZATION. 6be25d92-7c0e-4b2f-829e-108766e095df

This application does not have Additional APIs.

Questions

Questions or updates to any of the information you see here? Contact us!