Locked-up network perimeter
The network containing the Pactumize production servers (the service) is protected by redundant firewalls, intrusion detection systems and load balancers.
Role-based Access Control
Access control can be implemented in Pactumize to prevent or enable user groups to access, read and modify contracts.
We use known most secure Internet protocol, TLS 1.2 to encrypt data in transit. All files uploaded to Pactumize are also automatically encrypted when stored in our servers. We generate a unique key, using the AES-256 encryption algorithm and save files anonymously so that they cannot be identified.
Strong passwords and unique user names
Each user in Pactumize is identified with a unique user name and authenticated in the system with a personal password.