Security

Confidentiality

Locked-up network perimeter

The network containing the Pactumize production servers (the service) is protected by redundant firewalls, intrusion detection systems and load balancers.

Role-based Access Control

Access control can be implemented in Pactumize to prevent or enable user groups to access, read and modify contracts.

Military-grade encryption

We use the most used and secure Internet protocol, TLS 1.2 to encrypt data in transit. All files uploaded to Pactumize are also automatically encrypted when stored in our servers. We generate a unique key, using an advanced encryption algorithm and save files anonymously so that they cannot be identified.

Strong passwords and unique user names

Each user in Pactumize is identified with a unique user name and authenticated in the system with a personal password.