AES-256-GCM encryption
Applied for storage protection with integrity checks.
Proven encryption standards with policy-aware workflows for regulated teams.
Encryption
AES-256-GCM
Transport
TLS 1.3
Audit
Full event trail
Availability
99.9% target
Applied for storage protection with integrity checks.
Client-to-platform communication is protected in transit.
Choose end-to-end privacy or platform-managed encryption.
Permissions are separated by responsibility.
Capture file events, access patterns, and admin changes.
Encrypted backups and monitored infrastructure support reliability goals.
For high confidentiality content.
For operational collaboration and managed external sharing.
GDPR
Active posturePrivacy-oriented controls and audit visibility support regulated workflows.
CCPA
Active postureAdministrative controls support handling of sensitive customer data.
HIPAA-compatible workflows
E2E mode required for PHIPHI workflows should use end-to-end mode and organization policy controls.
SOC 2 Type II
In progressControl evidence and process maturity are in active progress.
Practice 1
Use end-to-end mode for regulated or highly sensitive material
Practice 2
Enforce strong password policy and enable multi-factor authentication
Practice 3
Limit share-link lifetime and max downloads by default
Practice 4
Review audit events for anomalous access patterns
Practice 5
Grant least-required role permissions and revisit quarterly