Coley, Inc.

Covered.

Every policy. Every contract. Every clause. Covered.

The Identity platform for general legal.

Privacy policies pressure-tested before publication. Terms of service reviewed for enforceability. Contracts and NDAs designed to survive litigation and regulatory scrutiny. This is what the platform looks like for legal documents.

Industries We Cover · General Legal Confidential · April 2026
Coley, Inc. · We read the room. An input-driven protection platform.
The Problem

Every company publishes legal documents. Most of them have gaps.

Every business has a privacy policy, terms of service, contracts, and NDAs. These documents are read by plaintiff attorneys, consumer advocates, regulatory bodies, and class action counsel. The privacy policy you copied from a template three years ago is the document that gets cited in the complaint.

Privacy & Data
Privacy Policy Exposure
CCPA, CPRA, state privacy laws, FTC enforcement — privacy policies are no longer boilerplate. They're binding representations about how you handle data. When your policy says one thing and your data practices do another, plaintiff attorneys and the AG have a case.
Contract Risk
Terms & Agreement Gaps
Terms of service with unenforceable arbitration clauses. NDAs with overbroad non-compete provisions. Vendor contracts with indemnification gaps. Every legal document your company publishes or signs is a potential liability — and most of them were drafted from templates that haven't been updated for current law.
Where each product is designed to help
Enterprise (Legal Operations)
Edge
Staff systems —
designed to protect
PII in legal docs,
contracts, comms
Route
AI conversations —
client intake,
complaint triage,
privilege escalation
Comply
Back office —
privacy compliance,
regulatory tracking,
audit-ready records
Audit
Legal —
privacy policies,
contracts, NDAs,
adversarial review
A Day at the Company

A Monday at a Series B SaaS company.

140 employees. B2B SaaS platform. Enterprise customers with their own legal teams. Every contract, every policy, and every terms update runs through a legal department of two — supported by outside counsel they can't afford to use for everything.

8:00 AM
Identity Audit™
The Privacy Policy Update
The company is launching a new analytics feature that processes user behavior data. The privacy policy needs updating. Audit runs the draft from the perspective of a CCPA plaintiff's attorney, an FTC enforcement attorney, and a consumer privacy advocate. Identified: the data collection disclosure doesn't meet CPRA's "specific pieces of information" requirement. The opt-out mechanism described doesn't comply with the "Do Not Sell or Share" framework. The data retention section conflicts with the company's actual deletion practices. Fixed before publication.
9:30 AM
Identity Edge™
The Contract Negotiation Email
The head of sales is emailing a customer's MSA redline to the CEO for quick review. The attachment includes the customer's proprietary pricing terms, confidential volume commitments, and internal negotiation notes. Edge is designed to identify the confidential information before it goes to a personal email address — keeping privileged negotiation content within the company's secure systems.
11:00 AM
Identity Audit™
The Enterprise MSA
A Fortune 500 prospect sent over their standard MSA. It's 47 pages. The company's two-person legal team doesn't have time to review it line by line before the deal deadline. Audit runs the MSA from the perspective of a commercial litigation attorney and an IP licensing specialist. Identified: an IP assignment clause that would give the customer ownership of any customizations. A liability cap that doesn't account for IP indemnification. A termination clause with no cure period. Three issues that would have cost six figures to litigate.
1:00 PM
Identity Route™
The Customer Data Request
A customer submits a request through the support portal: "Under CCPA, I want to know what personal information you have on me and I want it deleted." Route reads the input: CCPA data subject request, 45-day response deadline, identity verification required. Route escalates to the privacy team with the statutory clock flagged. The AI doesn't process data subject requests. A human does.
2:30 PM
Identity Comply™
The Vendor DPA Review
The company is onboarding a new email marketing vendor. Under CPRA, they need a Data Processing Agreement. Comply is designed to cross-reference the vendor's DPA against CPRA service provider requirements, identifying gaps: the DPA doesn't restrict the vendor from combining the company's data with other customers' data, and the audit rights clause is unenforceable. Renegotiated before the vendor touches a single customer record.
4:00 PM
Identity Audit™
The NDA That Actually Matters
The company is entering a partnership discussion that requires sharing proprietary algorithms. The partner sent their standard NDA. Audit runs it from the perspective of a trade secret litigation attorney and an IP specialist. Identified: the "residual knowledge" exception is broad enough to let the partner use anything their employees remember. The definition of "confidential information" doesn't specifically cover algorithms or training data. The non-solicitation clause is unenforceable under California law. Three gaps. All fixed before a single slide deck is shared.
The Numbers

One company. Four products. Potential impact.

~120
Contracts and legal documents reviewed per year for a growth-stage company.
100%
Privacy policies and terms designed to be reviewed before publication.
45 days
CCPA data subject request deadline. Every response matters.
$0
Outside counsel needed for routine contract and policy review.
The math on privacy exposure.
CCPA/CPRA statutory damages are $100–$750 per consumer per incident. A class of 100,000 users creates $7.5M–$75M in potential exposure. An FTC consent decree adds 20 years of monitoring and compliance costs. The cost of Audit is less than one hour of the privacy counsel you're currently paying.
Why General Legal

Why general legal is a natural fit.

Every company has legal documents. Most are out of date.
Privacy policies drafted before CPRA. Terms of service with pre-Dodd arbitration clauses. NDAs that don't account for California's non-compete ban. The legal documents most companies rely on were written for a regulatory environment that no longer exists.
Class action is the multiplier
A privacy policy gap that affects one user is a nuisance. A privacy policy gap that affects a million users is a class action. The same document, the same gap, but the exposure scales with your user base.
In-house teams are overwhelmed
Growth-stage companies have one or two lawyers reviewing everything: MSAs, privacy policies, vendor agreements, employment contracts. Outside counsel costs $500–$1,500/hour. Audit reviews the same documents in minutes.
California is ground zero for privacy
CCPA, CPRA, CalOPPA, California's non-compete ban, employee privacy rights — companies operating in California face the most aggressive consumer protection and privacy frameworks in the country. Every legal document needs California-specific review.
"The cost of Audit is less than one hour of the privacy counsel you're currently paying."
Pilot Terms

Try it. For free. On your documents.

The 30-Day Pilot
Give us your privacy policy, your terms of service, and 3 contracts. We run them through Audit for free over 30 days.
If the findings identify exposure your current review process missed, we talk pricing.
Audit
Privacy policy and ToS reviewed for CCPA/CPRA, FTC, and class action exposure
Audit
3 contracts pressure-tested for enforceability and risk allocation
No integration. No contract. No risk.
Just your documents, and our findings.
Platform Context

This is one use case. The platform extends.

General legal is one deployment. The same architecture is designed to serve banking, healthcare, insurance — any domain where compliance pressure meets operational complexity.

Edge
Active
Route
Active
Comply
Active
Audit
Active
Locker
Industries We Cover
Banking Healthcare Government Education Insurance Pharmaceuticals General Legal
Covered.
A Coley, Inc. industry deployment
"We read the room. An input-driven protection platform. "
Patent pending · getcoley.ai · Confidential
© 2026 Coley, Inc. · We read the room. An input-driven protection platform. · Delaware C-Corp · All rights reserved