You control who can see each document, how they can access it, and for how long.
Protecting documents means more than just blocking access. Prevent users from saving, printing, or copying documents to avoid offline leaks.
We give you the power of knowledge. As an administrator, you can know when each user logs on, when they access a document, and how they use it.
We make it easy to add users, set their access levels, and make sure they can see exactly which documents you want them to see.
Only allow users to view documents from a specific IP address and computer to assure they’re using them in a safe & secure location.
Want something back? We make it quick & easy by letting you revoke document access remotely.
Keep track of your documents with customizable electronic watermarks, so nothing can get misused or misplaced.
Set exactly how long each document is viewable, no matter where it goes, so that your confidential information is only available for the right amount of time.
Eliminate the effects of password theft by requiring users and administrators to login with two factors, like a password plus a unique phone code.
Compliant with Service Organization Controls (SOC) standards for the secure handling of financial information within a service organization. Assessed in accordance with the seven SOC Security Principles (TSPs), including organization, communications, risk management, control monitoring, physical data access, system operations, & change management.
Compliant with the United States Statement on Auditing Standards (SAS) section 70, which applies to service organizations. Assess the controls applied to data within an organization & their effectiveness.
Compliant with the Health Insurance Portability & Accountability Act of 1966, requiring multiple technical, physical, and administrative safeguards. Verified at the highest of three levels of HIPAA’s privacy, security, & breach notification assessments.
Compliant with the Canadian Standard on Assurance Engagements (CSAE) for Controls at a Service Organization, the Canadian extension of the International Standard on Assurance Engagements.
We use 256-bit AES SSL/TLS encryption for data in transit and at rest and equip all parts of our process with industry-strength antivirus software.
Multiple data centres and disaster scenario plans ensure that data remains unaffected in an emergency situation.
We use the same data centres as major financial institutions, which feature physical security measures like biometric and key card access, fire control, multiple backups, and 24/7 CCTV monitoring.
Your data sits behind firewalls at every point of transit to prevent, detect, & stop all intruders.
We stay aware of new threats and adapt our security measures before they can affect your data.