Peace of mind for our customers

Security and Storage Protocols

At the National Archive of Last Will and Testaments, we understand the importance of keeping your most sensitive documents safe and secure. Our commitment to security ensures that your final wishes and personal memories are protected, giving you and your loved ones peace of mind.

Security and Storage Protocol

Data
Encryption

Encryption in Transit: All data transmitted between clients and our servers will be encrypted using TLS (Transport Layer Security) to prevent interception by unauthorized parties.

Encryption at Rest: Sensitive data stored on our servers will be encrypted using AES-256 encryption to protect against unauthorized access.

Authentication & Access Control

Multi-Factor Authentication (MFA): Implement MFA for all user accounts to add an extra layer of security.

Role-Based Access Control (RBAC): Limit access to sensitive data based on user roles and responsibilities, ensuring that only authorized personnel can access critical information.

Regular
Security Audits

Internal Audits: Conduct regular internal security audits to identify and address potential vulnerabilities.

Third-Party Audits: Engage reputable third-party security firms to perform annual security assessments and penetration testing.

Data Backup
and Recovery

Regular Backups: Perform daily backups of all critical data to secure, off-site locations.

Disaster Recovery Plan: Maintain a comprehensive disaster recovery plan to ensure quick restoration of services in case of data loss or system failure.

Secure Development
Practices

Code Reviews: Implement regular code reviews to identify and fix security vulnerabilities during the development process.

Secure Coding: Standards: Follow industry best practices for secure coding to minimize the risk of security breaches.

User Education
and Awareness

Security Training: Provide regular security training for all employees to ensure they are aware of the latest security threats and best practices.

Phishing Awareness: Educate users about phishing attacks and how to recognize and avoid them.

Incident
Response Plan

Incident Detection: Implement monitoring tools to detect and respond to security incidents in real-time.

Response Procedures: Establish clear procedures for responding to security incidents, including communication protocols and steps for mitigating damage.

Compliance and
Legal Requirements

Regulatory Compliance: Ensure compliance with relevant data protection regulations, such as GDPR, CCPA, and HIPAA.

Privacy Policy: Maintain a transparent privacy policy that outlines how client data is collected, used, and protected.

Physical
Security

Data Center Security: Ensure that data centers housing our servers have robust physical security measures, including access controls, surveillance, and environmental controls.

Device Security: Secure all devices used to access sensitive data, including laptops, mobile devices, and workstations.

We are always striving for continuous improvement by regularly updating software and systems to patch known vulnerabilities.

Access

Robust Access Control

We ensure that only authorized individuals can access your documents. By carefully managing who can view your information, we guarantee that your private details remain confidential and are only seen by those you trust.

Protection

Comprehensive Content Protection

Our system restricts access to data based on complex protocols 0f membership levels and individual validated sessions. This means that only those with the appropriate permissions can view your sensitive data, ensuring that your privacy is always maintained.

Management

Secure Login and Session Management

We use advanced login methods to protect your account. Our session management system ensures that once you’re logged in, your data remains secure and your session is validated.

Encryption

Encryption for Ultimate Security

All data transmitted between your device and our servers is encrypted. This means that your personal information is protected from unauthorized access, keeping your data safe.

Safeguards

Database Protection

We employ stringent measures to safeguard our database. Your information is securely stored and protected against any potential threats, ensuring that your documents remain intact and accessible only to you and your designated executors.

Privacy

Ensuring Privacy with Content Obfuscation

Data access is granted only to paying members, preventing unauthorized viewing and ensuring that your data remains secure.

Why It Matters

Your final wishes and personal memories are invaluable. Our comprehensive security protocols are designed to protect these precious assets, ensuring that they remain safe and accessible only to those you trust. By choosing the National Archive of Last Will and Testaments, you are investing in peace of mind, knowing that your legacy is secure.

You're One Step Away
From Our Pricing!

We would appreciate your info to contact you about specials and newsletter updates. In return, use our 2024 Fall Season discount code below, at checkout, to receive 10% off on the initial registration fee. Just enter your name and email and you’ll be redirected to our pricing page. Thanks! 

10% DISCOUNT:
FALL2024

Annual

Click below for the great features with this subscription

$ 99.00 per year

*Plus $149.95 Registration Fee

Monthly

Click below for the great features with this subscription

$ 10.00 per month

*Plus $149.95 Registration Fee