Can we restrict individual user access to specific documents? Yes. Private documents require the user to be authenticated & authorized before accessing a document. Author/publisher have access control settings to give access only to certain user accounts. Are the Personally Identifiable Information and other data encrypted at rest? Yes, Encryption-at-rest is automated using AWS's transparent disk encryption, which uses industry-standard AES-256 encryption to secure all volume (disk) data. All keys are fully managed by AWS. Is the connection to RELAYTO encrypted? Everyone with a RELAYTO account has encryption on all RELAYTO connections. RELAYTO defaults and redirects all traffic to the secure HTTPS protocol. The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_ECDSA with P-256), and a strong cipher (AES_128_GCM). SSL is an acronym for “Secure Socket Layer”, a security protocol that provides communications privacy over the Internet. The protocol allows RELAYTO to securely communicate in a way that is designed to prevent eavesdropping, tampering, or communications forgery. It is the same technology used by banks and e-commerce companies such as Amazon.com to keep your information safe and secure during transactions. In RELAYTO's case, SSL keeps your communications absolutely secure (RELAYTO's normal password protection keeps your information private, but SSL keeps it private and secure). Yes, our company maintains a strict standard for encrypted communications, including email communications, with both our customers and third-party entities. We adhere to industry best practices to ensure that all sensitive information transmitted electronically is securely encrypted. Our standard protocol includes: TLS (Transport Layer Security): For email communications, we use TLS to encrypt the connection with email recipients. This ensures that the content of the emails is secure and protected from interception during transit. Is RELAYTO protected against injections attacks, cross site scripting, etc.? RELAYTO combines innovation in incorporating web widgets/embeds and other elements into the documents AND ensuring this richer document experience - attains enterprise-grade security. RELAYTO’s Infrastructure/Security Team reviews security implications and ways to mitigate them. We undergo rigorous security audits before introducing a new innovative feature. Here is how RELAYTO protects your documents while delivering an interactive web experience. 44 of 52
Terms, Conditions, Policies & Plans Page 43 Page 45