Will my electronic will be kept safe and secure?

Private Cloud Storage

  • Your files are replicated across multiple SSAE 16 type 2 certified datacenter locations with SAS RAID storage, automatic failover and a 99.9% or better uptime SLA.
  • End-to-end encryption protects your confidential data in the cloud from unauthorized access at all times.  You will be provided with a 365/24/7 link to view and/or download your files.
  • Global data privacy compliance insures that your files are safe in the cloud with USA, EU / UK GDPR, and Canadian compliance built-in, including Canadian data residency.

File Backup Redundancy and Tamper-Proofing

In addition to our secure cloud storage solution, your electronic will, the notary’s journal, and the original audio-video recording of the online notarization, is stored by our online notary technology service provider using a best-in-class system creates a truly unique document security environment by establishing seven layers of security.

  1. Cover page for all documents with bar coding and watermarking technologies

    • Each document contains a unique watermark specifically created for that document.
    • Each cover page has its own barcoding sequence utilizing the bates numbering system identifying it as the cover page.
  2. Time stamping, bar coding, unique numbering, and watermarking for every page

    • Each document contains a unique watermark specifically created for that document.
    • Prevents document manipulation or camera-based attacks by stamping each page with the date and time the document was created, page numbers, unique bar codes, bates numbering system, and dynamically embedded watermarks.
  3. Unique 128 bit IDs

    • Each document has a unique 128-bit ID, which consists of 32 hexadecimal digits, making it virtually impossible for any ID duplication.
  4. Two unique hash fingerprints

    • Secure hash algorithms 384-bit or 512-bit one-way hashes or “message digests” to create a unique fingerprint of the documents; whereas, most providers use the very weak SHA1 algorithm which is vulnerable to attacks.
  5. Compliant PKI technologies

    • Each document is protected with strong PKI hashing. Certificates are stored securely and encrypted in order to protect them from being compromised. This is a good thing. Ask your local hacker.
  6. Unique bar codes

    • Each document will contain a unique bar code that identifies that individual page. The bar codes utilize the bates numbering system within the bar codes.
  7. Unique Digital Signatures

    • A  signature method known as short-lived certificates is employed.  In most cases, certificates are issued every two to three years, but the certificates used by our provider expire several times daily. This method prevents a hacker of using a certificate to sign documents on your behalf if a compromise is not detected, where most providers will not be aware of a compromise until it’s too late.

 

 

Leave a Comment