Skip to main content
Table of Contents

August for Word Add-In: Security & Data Privacy

August for Word Add-In: Security & Data Privacy. Learn how to use August’s Word add-in securely, with enterprise-grade data protections, admin controls, and compliance safeguards — so you can draft,…

Hayden
Updated by Hayden

August for Word Add-In: Security & Data Privacy

Learn how to use August’s Word add-in securely, with enterprise-grade data protections, admin controls, and compliance safeguards — so you can draft, redline, or review documents directly in Word without compromising confidentiality or control.

Overview

The August Word add in brings the capabilities of the August legal workspace directly into Microsoft Word. Because legal work often involves sensitive or privileged content, the add in is designed with strong security, privacy protections, and administrative controls. This guide explains how August handles data, how authentication works, and how firms can deploy and manage the add in securely.

Data Handling and What August Can Access

  • August only processes the content you explicitly provide when you open a document and request drafting, redlining, summarization, or review
  • August does not scan your device, local folders, or Word library
  • Files such as Word documents, PDFs, or attachments are only processed when you choose to upload or use them in the add in
  • All data transmitted between your device and August is encrypted in transit
  • Any saved content such as drafts or redlines is stored under your firm’s control and follows your firm’s retention and access policies
  • August does not use your confidential documents or client related material for external model training or public datasets

Authentication, Access, and Deployment Options

Secure Authentication (SSO)

  • August uses Single Sign On for authentication
  • Only users with approved firm credentials can access the add in and work with firm documents

Deployment Options for IT and Admins

Firms can deploy the Word add in through:

  • Centralized or tenant level deployment (recommended)
  • Private add in catalog
  • Enterprise deployment tools such as SCCM or Intune
  • Manifest file sideloading for restricted environments
  • Direct installation from the add in store if permitted by internal policy

Centralized deployment allows firms to control who has access, manage updates, and enforce consistent security standards.

Admin Controls, Audit Logging, and Compliance Features

  • All use of the add in such as edits, redlines, exports, uploads, and document actions can be logged and audited
  • Admins can define permission levels to control who can run reviews, export files, or upload data
  • Firms retain full control over data location, retention rules, and deletion settings
  • August supports regional hosting and data sovereignty configurations as required for compliance
  • The system is designed to meet the needs of legal, corporate, and regulated industry environments

User Best Practices

When using the Word add in:

  • Only open or upload files you are authorized to access
  • Avoid including unnecessary personal or sensitive information in prompts
  • Use approved templates or language libraries provided by your firm
  • Apply firm controls when exporting or saving documents, such as versioning, encryption, or restricted access
  • Always review AI generated edits, summaries, or redlines before sharing or finalizing a document

Frequently Asked Questions

Does August read my entire hard drive or Word library No. August only processes files you explicitly open or upload through the add in.

Is data encrypted when transmitted Yes. All communication between your device and August is encrypted. Stored documents follow your firm’s retention and security settings.

Who can deploy the add in Only authorized IT administrators or users with deployment permissions can install or distribute the add in.

Can we track document edits or exports Yes. Audit logging records uploads, edits, redlines, exports, and document history for compliance oversight.

Does August use my documents for model training No. Documents you upload or edit are not used to train external models. Data remains under your firm’s control.

Legal professionals handle privileged, confidential, and sensitive information daily. The August Word add in allows you to work efficiently in Word with strong security and governance in place. You can draft, redline, and review documents without compromising confidentiality, while your firm maintains oversight, auditability, and compliance controls.

How Did We Do?

August for Outlook: Security & Data Privacy

Contact