Trust, security, methodology

Legal buyers should ask hard questions. Here are straight answers—then your counsel fills in what software cannot.

Operational & procurement

  • Security / DPA: overview on Security & DPA; full subprocessor list and Article 28 terms for signed customers.
  • Entity & contracting: Adriatic Holdings OÜ, registry code 16571644 (Estonian Commercial Register). Full registered address and VAT appear on orders; operating contact: krukovskiadrian@gmail.com.
  • Response expectations: contact form triage aimed within two business days for complete requests; pilots get a named channel after signup.

Where the rules come from

  • Primary national texts: official journals and consolidated acts in our coverage map
  • EU instruments as published in Eur-Lex, aligned to national transposition where we index it
  • Supervisor guidance only when it lives in official corpora we deliberately ingest (not random PDF scrapes)

How often data is refreshed

Ingestion runs are tied to published changes on sources we track; we retain source timestamps and surface them next to excerpts where the pipeline supports it. There is no pretend “live to the minute” claim—if a gazette drop has not been processed yet, the UI should say so.

Who reviews what

Operators validate ingestion edge cases (parsing failures, ambiguous consolidations) and escalate model behavior that drifts from citation discipline. They do not bless outputs as legal advice or filing-ready conclusions for your specific facts.

Security (overview)

TLS in transit, authenticated workspaces, auditable sessions. Details and subprocessors for your vendor review live on the Security page and in customer agreements—not a substitute for your infosec sign-off.

Liability framing

SeadSync provides retrieval and decision-support against sourced texts. It is not legal advice, a law firm, or a replacement for counsel on filings, litigation, or regulatory exams. You remain responsible for how you act on any output.

What we do not do

  • Guarantee completeness outside the coverage table
  • Hide low-confidence regions behind marketing polish
  • Run a content farm to simulate thought leadership

Due diligence pack? Start on Contact or see Security & DPA.