SECURITY

We Take The Security of Your Data Very Seriously.

The policies, protocols, and protections we’ve implemented are meticulously designed with a singular focus: to ensure the privacy and security of your account and its data.

Data protection & encryption

Data at rest

Advanced Encryption Standard (AES) 256-bit encryption. All stored data is encrypted to the highest standard—the same as that used by all US financial institutions.

Data in motion

We use Transport Layer Security (TLS) 1.2 encryption protocol. This cryptographic protocol ensures secure delivery of data transferred over the internet. It protects that information that is being transferred, and also authenticates the website’s identity. Sites with a TLS/SSL certificate are identified as such by the https and the padlock icon in the browser’s address bar.

Data ownership

Client information

We appreciate that you have entrusted us with important client details. We will never share, sell, or transfer any information about you, or any data that you store using our services without your consent or as outlined in our privacy policy. Visit our Privacy Policy to learn more.

Data deletion

If you decide that you would like to cancel your service and delete your account, we ensure that all information and documents associated with your account are completely and irreversibly removed—with final removal of any security backups occurring 35 days from your initial request.

Certifications

SOC2 and HIPAA

To ensure the highest level of data protection for our clients, all of our cloud vendors have successfully completed Type 2 Service Organization Control 2 (SOC 2 Type II) and Health Insurance Portability and Accountability Act (HIPAA) audits. These certifications, conducted by an independent CPA, confirm that our vendors maintain rigorous information security policies and procedures. This independent verification assures that our operations meet or exceed the stringent controls necessary for safeguarding your data. We are fully prepared to provide proof of these certifications upon request.

Identity management & authentication

Passwords

We prevent unauthorized activity through password limitations (including the recommendation of creating a password of 14 characters or more.) Additionally, we automatically log users out after 10 minutes period of inactivity so that unauthorized users may not access any of your data.

Reporting

In the rare event of a system outage, we have processes in place to ensure all data remains safe and secure. We’ve also established disaster recovery and business continuity plans to protect your information. If you happen to notice a security issue affecting The Best Notary or any of our users, please contac us at [email protected]. Your vigilance and support are greatly appreciated.

Get Started with The Best Notary

Tell us more about your firm so we can prepare a customized quote.

Join 16,000 people who receive updates on AI-powered outsourcing for estate planning attorneys every two weeks.