HTTPS enforced everywhere and AES 256-bit encryption at rest.
Require two factor authentication, strong passwords, and use single sign-on.
User Audit Logs
Track all user changes with searchable and exportable audit logs.
Role-based Access Control
Define each role and user permission at a granular level.
Block access to your account from any unauthorized IPs or locations.
Private Key Management
Create and manage your own encryption keys.
Government and Private Cloud
Deploy on-premises in your data center or virtual private cloud.
Automated rollover and data backups ensure 99.95% uptime.
Control data retention policies to comply with archiving rules.
Security Best Practices
Securing your data is our greatest responsibility, and ensuring it's protection is at the core of everything we do. We combine expertise, vigilance, and automation to keep data protected. We are happy to answer any of your questions regarding our security practices.
We use Secure Sockets Layer (SSL) to serve eCourtDate and our APIs, over HTTPS. This is the same level of encryption used by leading banks and government agencies. We offer integration with third-party authentication services like Office 365, Google, LinkedIn, OAuth 2.0, and LDAP (On-Premises only). You can enforce password policies for your internal users as well as 2 Factor Authentication and definable user roles.
Our 24/7 Support Team continuously monitors the performance and integrity of our services, including intrusion attempts, via comprehensive monitoring tools. We can anticipate potential issues and deploy solutions to prevent them from happening. We are proactive, rather than reactive.
eCourtDate operates a Zero-Trust Network architecture without any trusted network segments. All network communication is encrypted in transit.
Backups occur via continuous streaming replication and frequent snapshots. We maintain firewalls on our edge servers and origin load balancers.
We host eCourtDate on Amazon Web Services (AWS). Amazon's data centers are state-of-the-art, and they have achieved ISO 27001 Certification. Physical access is strictly controlled by professional security staff, video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized personnel must pass repeated two-factor authentication to access data center floors. Environmental security controls to safeguard against fire, power fluctuations and outages, and challenging weather conditions.
If we integrate payment capability into your reminders, we do not store credit card information on our servers. Payment information is transmitted directly to a PCI compliant payment processer of your choice via HTTPS for secure processing.