Peace of mind for our customers
Security and Storage Protocols
At the National Archive of Last Will and Testaments, we understand the importance of keeping your most sensitive documents safe and secure. Our commitment to security ensures that your final wishes and personal memories are protected, giving you and your loved ones peace of mind.
Security and Storage Protocol
Data
Encryption
Encryption in Transit: All data transmitted between clients and our servers will be encrypted using TLS (Transport Layer Security) to prevent interception by unauthorized parties.
Encryption at Rest: Sensitive data stored on our servers will be encrypted using AES-256 encryption to protect against unauthorized access.
Authentication & Access Control
Multi-Factor Authentication (MFA): Implement MFA for all user accounts to add an extra layer of security.
Role-Based Access Control (RBAC): Limit access to sensitive data based on user roles and responsibilities, ensuring that only authorized personnel can access critical information.
Regular
Security Audits
Internal Audits: Conduct regular internal security audits to identify and address potential vulnerabilities.
Third-Party Audits: Engage reputable third-party security firms to perform annual security assessments and penetration testing.
Data Backup
and Recovery
Regular Backups: Perform daily backups of all critical data to secure, off-site locations.
Disaster Recovery Plan: Maintain a comprehensive disaster recovery plan to ensure quick restoration of services in case of data loss or system failure.
Secure Development
Practices
Code Reviews: Implement regular code reviews to identify and fix security vulnerabilities during the development process.
Secure Coding: Standards: Follow industry best practices for secure coding to minimize the risk of security breaches.
User Education
and Awareness
Security Training: Provide regular security training for all employees to ensure they are aware of the latest security threats and best practices.
Phishing Awareness: Educate users about phishing attacks and how to recognize and avoid them.
Incident
Response Plan
Incident Detection: Implement monitoring tools to detect and respond to security incidents in real-time.
Response Procedures: Establish clear procedures for responding to security incidents, including communication protocols and steps for mitigating damage.
Compliance and
Legal Requirements
Regulatory Compliance: Ensure compliance with relevant data protection regulations, such as GDPR, CCPA, and HIPAA.
Privacy Policy: Maintain a transparent privacy policy that outlines how client data is collected, used, and protected.
Physical
Security
Data Center Security: Ensure that data centers housing our servers have robust physical security measures, including access controls, surveillance, and environmental controls.
Device Security: Secure all devices used to access sensitive data, including laptops, mobile devices, and workstations.
We are always striving for continuous improvement by regularly updating software and systems to patch known vulnerabilities.
Access
Robust Access Control
We ensure that only authorized individuals can access your documents. By carefully managing who can view your information, we guarantee that your private details remain confidential and are only seen by those you trust.
Protection
Comprehensive Content Protection
Our system restricts access to data based on complex protocols 0f membership levels and individual validated sessions. This means that only those with the appropriate permissions can view your sensitive data, ensuring that your privacy is always maintained.
Management
Secure Login and Session Management
We use advanced login methods to protect your account. Our session management system ensures that once you’re logged in, your data remains secure and your session is validated.
Encryption
Encryption for Ultimate Security
All data transmitted between your device and our servers is encrypted. This means that your personal information is protected from unauthorized access, keeping your data safe.
Safeguards
Database Protection
We employ stringent measures to safeguard our database. Your information is securely stored and protected against any potential threats, ensuring that your documents remain intact and accessible only to you and your designated executors.
Privacy
Ensuring Privacy with Content Obfuscation
Data access is granted only to paying members, preventing unauthorized viewing and ensuring that your data remains secure.
Your final wishes and personal memories are invaluable. Our comprehensive security protocols are designed to protect these precious assets, ensuring that they remain safe and accessible only to those you trust. By choosing the National Archive of Last Will and Testaments, you are investing in peace of mind, knowing that your legacy is secure.