Skip to main content
Data-Security

data Security

Product security 

Our product is secure by design, where every change and feature in our product goes through secure coding guidelines, code analyzer tools, vulnerability scanners, and manual review processes. Our security framework based on OWASP standards, implemented in the application layer, provides functionalities to mitigate threats.

Data security

Our framework ensures that each customer’s data is logically separated from other customers’ data. Furthermore, we provide encryption at rest as well as in transit to protect our customers’ data. Data retention and backup happens in a secure manner.

Availability

Our disaster recovery and business continuity programs help us provide you with high availability. This ensures that operations carry on smoothly with minimal or no loss of time, if one Data Center fails.

Operational security

We have a logging and monitoring system to ensure clean and secure traffic through our servers. We use intrusion detection and prevention systems to ensure protection and prevent misuse of our infrastructure. We use a combination of certified third-party scanning tools and in-house tools to manage vulnerabilities.

Security FAQ

Where is the solution hosted

The solution is hosted on private cloud at ISO 27001, HIPAA and SOC II certified data center in USA

How is my data secured with Please+Publish

All sensitive data information are encrypted end to end including data at rest and in transit using user management and access control/ restriction are followed to ensure only the right people have access to data at the right time

Is the solution GDPR Complaint

Yes our solution is GDPR complaint.

How to delete my files from system

 Users can delete their files anytime. From file manager or job manager all files can be deleted

How will Please+Publish handle updates and security patches ??

Security patches are applied without impact to end users on frequent basis. Product improvements are done on monthly and quarterly basis and made available to all users

How is access to converted documents controlled?

Access to converted documents is tightly regulated using authentication. Only authorized users with proper credentials can access files. We maintain access logs for auditing.

What happens to the documents after my jobs are complete?

After file processing, you control what happens next. Download securely, store in your desktop or another EDMS, or you can choose automatic deletion based on your preferences.

What measures are in place to prevent data breaches or leaks during conversion

We regularly assess and test our systems for vulnerabilities and employ strong intrusion detection and prevention measures to prevent unauthorized access and data breaches.