|SE Security and Encryption|
All data is encrypted before it leaves your computer(s) and is never accessible without your encryption key. This encryption key is stored only on your computer and is never transmitted over the Internet or stored on SE’s servers. Only you have access to your files, eliminating the threat of unauthorized access. SE cannot access the files or even read the filenames.
Each file is individually encrypted using a unique 128-bit encryption key. SE uses 128-bit Advanced Encryption Standard (AES) encryption technology, which was developed by the U.S. National Institute of Standards and Technology (NIST) and is the current military standard.
For added security and to meet the Security Rule’s transmission requirements, each encrypted file is sent over the Internet via a secure channel using Secure Sockets Layer (SSL) technology. This is the same Internet transmission technology that is used for online banking and online credit card transactions. As a result, data is encrypted twice: at all times using the 128-bit AES encryption, again while being sent over the Internet to and from SE servers.
Further, all your data is sent to a fully redundant server and stored in a third redundant secure data center at another physical site. Each data center has 24/7 onsite monitoring, advanced security technology (such as biometric access controls), backup generators, and redundant connections to the Internet.
SE Logging and Archiving
Backups and restores are automated, eliminating the need for manual data handling. Backups begin automatically according to each backup set’s schedule, as long as the computer is on and functioning and not in sleep or power save mode. You can also initiate backups at any time. Because backups run in the background of the system, they have little or no impact on the computer's performance or Internet connectivity.
You can restore files with just a few clicks of the mouse. Using SE’s software, simply click on the individual files, folders, or revisions you want to retrieve. The file(s) are then downloaded to your computer, decrypted, uncompressed, and restored to their original location or another specified location on your system. A password is required to restore any files, which prevents unauthorized restores. This adheres to the majority of compliance regulations or company policies suggested by our clients.
In the event of a complete system failure, you can initiate a full recovery of backed up data in minutes. This recovery can be done from any computer, and not solely from the computer in which the files were originally backed up. You can download and reinstall SE software, enter your username and password, and load or type the encryption key. Once the software installation is completed, a few clicks of the mouse will quickly and efficiently restore the files, allowing you to continue business as usual.
Please note that nothing on this website is intended to constitute legal advice. For more information about compliance within your industry or profession, consult your legal counsel.
Basic Online Backup Plans
Our Executive Plans add specialized backup agents for all commonly used databases, ensuring complete protection of your critical data.
Now you can manage all of your business information in a secure environment. We convert all of your paper documents to digital and allow you to manage your office from anywhere in the world at any time of the day.
Mon 08/31/2009 21:10How Integrating Electronic Document Management Can Save Your Company Money
Mon 08/31/2009 20:027 Reasons Why Remote Document Hosting is the Safest Way to Store Documents
Thu 07/16/2009 14:09iDOCcorp: Check this video out -- Document Management Texas http://bit.ly/Rr6Wy