Family-law matter data is some of the most sensitive data a person will store anywhere. This page covers the security practices RYTZ recommends for accounts holding active matter data — what the platform offers, what to enable, and what to do if you suspect compromise.Documentation Index
Fetch the complete documentation index at: https://help.rytz.com.au/llms.txt
Use this file to discover all available pages before exploring further.
Two-factor authentication (2FA)
Strongly recommended for every active matter. 2FA prevents someone with your password alone from accessing your account.Enabling 2FA
Choose your 2FA method
Two options:
- Authenticator app (recommended) — Google Authenticator, Authy, 1Password, Bitwarden. Standard TOTP. Most secure.
- SMS — code sent to a registered phone number. Less secure than authenticator app; use only if authenticator app isn’t an option.
Scan the QR code (authenticator)
For authenticator-app 2FA, the platform shows a QR code. Scan with your chosen app. The app generates a 6-digit code that rotates every 30 seconds.Save the recovery codes shown alongside the QR code somewhere safe (password manager, printed and stored offline). These are your backup if you lose access to the authenticator device.
What 2FA does
Once enabled, every sign-in (after password) requires a second factor:- Authenticator app: enter the current 6-digit code
- SMS: enter the 6-digit code sent to your phone
Recovery if 2FA device is lost
If you lose the device with your authenticator app:- Use one of the recovery codes (saved when you set up 2FA) to sign in
- Disable 2FA on the recovered account
- Re-enable 2FA on a new device
Family-violence safe-exit
For users with FV disclosed in their case file, the platform offers safe-exit — a one-click feature that closes the platform and clears the browsing trail for the current session.Enabling safe-exit
Safe-exit is enabled by default for FV-disclosed users. To enable manually (if you want it as a precaution without FV disclosure):What safe-exit does
When you click the Safe-exit button:- Sign out of RYTZ immediately
- Replace the current browser tab with the configured destination
- Trigger the browser’s “back button doesn’t return to RYTZ” pattern (best-effort; depends on browser)
- Optionally clear browser history for the session (where supported)
Session management
The Settings → Security page shows every active session — the device, browser, IP address, and last-activity time for each.What to do with sessions
- Sign out a specific session — for a device you no longer use (sold laptop, replaced phone)
- Sign out everywhere — for situations where you suspect compromise
- Sign out all except current — single-click to retain only the device you’re on
Strong-password practices
If using email + password sign-in:Use a password manager
1Password, Bitwarden, LastPass, or your browser’s built-in. Generate a unique strong password for RYTZ. Don’t reuse a password from another service.
Length matters more than complexity
A 16-character random password is far stronger than an 8-character one with special characters. Modern password-cracking tools handle complexity easily; length is the harder problem.
Don't share your password
Even with someone who ‘helps’ with the matter (a family member, a friend). Sharing access compromises 2FA’s value. If genuine multi-user access is needed, contact support for guidance.
Rotate after suspected compromise
If you suspect the password has been seen by anyone (over your shoulder, on a shared device), change it immediately.
What if I suspect my account was accessed?
Three immediate actions:Sign out everywhere
From Settings → Security. Terminates every active session including any unauthorised one.
What the platform does at the infrastructure level
A high-level summary of what runs underneath:- Encryption at rest — AES-256 encryption for all stored data including evidence uploads, drafts, conversation history
- Encryption in transit — TLS 1.3 for all client-server communication
- Australian-jurisdiction storage — data centres in Australia for AU-located accounts
- Daily backups — encrypted, retained per the platform’s data-retention policy
- Security audits — independent annual penetration testing, results summarised in Privacy and data
- Incident-response policy — formal notification procedures if a breach affects user data
Pre-shared sensitive data — what to do
Some users sign up after sharing sensitive data with a previous platform (a generic AI chatbot, a Google Doc, an email thread). If that’s you:- Audit what’s been shared elsewhere. Do you have data on a previous platform that should now be deleted?
- Migrate substantively. Treat RYTZ as the new home for the matter; consolidate evidence here, archive elsewhere.
- Don’t paste highly sensitive content into AI chats outside this platform. Other AI chats may use your inputs in ways that don’t fit your matter’s privacy needs.
What’s next
Settings
The full settings hub including Security.
Privacy and data
What data the platform stores and how it’s protected.
Signing in
Sign-in methods and 2FA recovery.
Limits and safety (AI)
Family-violence safety overlay applied to AI interactions.

