LexisNexis Nexis
The largest licensed news and public records database — 39,000+ sources, 45 years of archives, 138 billion documents. The backbone of professional investigative research.
What should journalists know about LexisNexis Nexis?
Nexis is the industry-standard research database for professional journalism. No competing product matches its combination of scale (39,000+ licensed sources in 50 languages, 138 billion documents, archives back to the late 1970s) and structured search. SmartIndexing lets you search without Boolean syntax. Nexis+ AI adds conversational search and predictive analytics. SmartLinx maps relationships between people, companies, and properties using 82 billion public records from 13,000+ data sources — essential for connecting dots in investigations. The content is the draw. Nexis aggregates full-text articles from major newspapers, wire services, trade journals, magazines, broadcast transcripts, court filings, and company profiles (540 million). For investigative work requiring historical context or cross-referencing across publications, nothing else comes close. The problems are real. Pricing is opaque and expensive — enterprise contracts run to tens of thousands annually, and LexisNexis does not publish rates. The UI is functional but dated. ExpertAccess at $26/month gets freelancers into news archives, but excludes public records and court documents — the features most valuable for investigations. Ownership matters. LexisNexis is a division of RELX plc (formerly Reed Elsevier), a London-based information conglomerate with £9.59 billion in 2025 revenue. RELX also operates LexisNexis Risk Solutions, a separate division that sells surveillance and data analytics tools to law enforcement. Risk Solutions holds a $22.1 million contract with ICE, renewed despite opposition from 200+ journalists at RELX-owned publications. The Intercept reported that ICE searched the LexisNexis database over 1.2 million times in the first seven months of the contract. Risk Solutions is distinct from the Nexis research product, but they share a parent company and brand — journalists covering immigration, civil liberties, or law enforcement should weigh this. In February 2026, hackers breached LexisNexis Legal & Professional's AWS infrastructure, exfiltrating 2.04 GB of data including 400,000 cloud user profiles and 21,042 enterprise customer accounts. The attackers exploited a React2Shell vulnerability that CISA flagged in December 2025. LexisNexis failed to patch for over two months. The breach revealed weak internal security practices: the RDS master password was "Lexis1234" and a single IAM role granted read access to all AWS Secrets Manager entries. LexisNexis said the breach is contained and involved "mostly legacy data." Despite these issues, Nexis remains essential for serious investigative and archival research. No alternative aggregates this volume of licensed, full-text content in a single searchable platform.
Deep archival news research, background checks on people and companies, fact-checking claims against historical records, corporate investigation and due diligence, tracking relationships between entities via SmartLinx, cross-referencing coverage across thousands of publications.
Breaking news monitoring (Nexis Newsdesk is a separate product). Budget-constrained freelancers who only need occasional lookups — the pricing is prohibitive without ExpertAccess. Journalists who need real-time social media monitoring. Anyone who needs a modern, intuitive interface — the learning curve is steep.
Security & Privacy
Data is scrambled while being sent to their servers
Data is scrambled when stored on their servers
Where servers are located — affects which governments can request your data
Privacy policy summary
LexisNexis collects usage data including search queries, documents accessed, and account information. Enterprise customers can negotiate data handling terms. The February 2026 breach exposed user profiles (names, emails, phones, job roles) and enterprise account data — including 118 .gov profiles from federal judges, DOJ attorneys, and SEC staff. LexisNexis maintains a Trust Center with compliance documentation but has not disclosed SOC 2 Type II certification publicly. The parent company RELX operates across legal, risk, scientific, and exhibitions divisions — data practices vary by division.
How to protect yourself:
Use a dedicated work email for your LexisNexis account — not a personal address. Enable multi-factor authentication if available. Do not store sensitive source identifiers in Nexis search history or saved searches. Review and clear search history periodically. If your newsroom has an enterprise contract, confirm data retention and training exclusion terms. For freelancers using ExpertAccess, understand that your searches go through the same LexisNexis infrastructure — the same security posture applies. After the February 2026 breach, verify your account was not affected and rotate your password. Do not reuse your LexisNexis password elsewhere.
LexisNexis deploys encryption in transit and at rest, network security controls, and logging. However, the February 2026 breach exposed serious operational gaps: an unpatched critical vulnerability left open for two months, a weak master database password, and overly permissive IAM roles that gave a single credential access to all cloud secrets. The breach affected 400,000 user profiles. LexisNexis maintains a Trust Center but has not publicly disclosed SOC 2 Type II certification. The core Nexis research product has standard enterprise security controls, but the 2026 incident demonstrates that infrastructure hygiene has not matched the company's scale or the sensitivity of its user base — which includes federal judges and DOJ attorneys. Rating reflects adequate baseline security with documented recent failures.
Who Owns This
Known issues
February 2026 data breach: Hackers exploited an unpatched React2Shell vulnerability in LexisNexis AWS infrastructure, stealing 2.04 GB of data including 400,000 user profiles, 21,042 enterprise accounts, and 53 plaintext cloud secrets. CISA flagged the vulnerability in December 2025; LexisNexis failed to patch for two months. Internal security was poor — the RDS master password was "Lexis1234." LexisNexis called the breach "contained" and said it involved "mostly legacy data." ICE surveillance contracts: LexisNexis Risk Solutions (a separate RELX division) holds a $22.1 million contract with ICE for the Accurint database and Justice Intelligence platform. ICE used it to search records 1.2 million times in seven months. Immigration advocates sued (case dismissed for standing). Over 200 journalists at RELX-owned Law360 signed a letter opposing the contract. Human rights groups including the ACLU called on ICE not to renew. The contract circumvents sanctuary city policies by giving ICE direct access to incarceration records that local jurisdictions refused to share. Pricing opacity: LexisNexis does not publish standard pricing. Costs vary by negotiation, contract term, user count, and content packages. This makes comparison shopping difficult and favors institutional buyers over independents. UI and usability: The Nexis interface is powerful but dated. New users face a steep learning curve. Nexis+ AI improves this with conversational search, but the core product still requires Boolean or structured query skills to use effectively. Academic access restrictions: Nexis Uni (the academic version) has a smaller source set (17,000 vs. 39,000+) and may limit access after graduation, leaving early-career journalists without affordable options.
Pricing
Pricing is opaque and negotiated. Nexis Essential, Nexis+ AI, and Nexis Essential with Nexis+ AI are available as 3-month or annual subscriptions — LexisNexis does not publish list prices. Enterprise and multi-user plans require a sales call. Single-user plans reportedly start around $50/month. For independent journalists and freelancers: ExpertAccess.org offers Nexis news archives (10,000+ publications) at $26/month on a one-year commitment — the most affordable entry point, but excludes public records (Accurint) and CourtLinks.
This is an editorial assessment based on publicly available information as of 2026-04-03, using our published methodology. Independent security review is pending. Security posture can change at any time. This is not a guarantee of safety.
Something wrong or outdated? Report it.