Security

Security & Trust

Enterprise-grade controls for document security and compliance. Your data stays protected, accessible only where you choose.

Encryption

In transit: All data is encrypted using TLS 1.3 when moving between your browser, our servers, and any integrated systems.

At rest: Documents and metadata are stored in encrypted object storage. Encryption keys are managed with industry-standard practices.

Access Controls

Role-based permissions control who can view, edit, share, or delete documents. Team hierarchies and granular sharing settings give you visibility and control over every document.

Audit Logs

Activity logs track document access, uploads, downloads, and sharing events. Audit trails support compliance and forensic review when needed.

Secure Sharing

Share documents via time-limited links and controlled permissions. You decide who sees what and for how long.

Region & Data Residency

Business and Enterprise plans support region-aware storage. Choose where your data lives—US, Canada, EU, or other regions—to meet compliance and data residency requirements.

Infrastructure Protection

Our infrastructure benefits from global edge protection, DDoS mitigation, and continuous monitoring. Object storage and AI processing run on secure, highly available systems.

Privacy & AI Data Handling

Customer documents and data are not used to train AI models unless you explicitly agree. AI processing is routed through secure pipelines, and data handling follows our privacy commitments.

Get started

Bring Order to Your Client Documents