FAQ

When using our service to send or receive files, you have access to a dedicated and secure global cloud infrastructure where files are stored and encrypted on disk (AES-XTS 256 bits) in data processing centers (AICPA SOC 2 Type II) across European, American, and Asian continents."

Any organization that handles file transfers containing Protected Health Information (PHI) must adhere rigorously to the HIPAA Security Rule. This rule mandates the implementation of appropriate administrative, technical, and physical safeguards to guarantee the accuracy, confidentiality, and security of PHI. HIPAA compliance entails conducting annual audits to identify security risks, implement privacy controls, and establish breach response protocols. Additionally, it emphasizes the Access Control standard, ensuring that users have the minimum level of access required to perform their job functions.

No, we do not access the files that pass through our solution unless abuse is reported, such as in a download link, and if the files are in violation of our terms of service.

Absolutely! We take data security seriously. We conduct regular, daily backups to ensure the safety of your files. In the unlikely event of data loss, we have the capability to recover your lost files. Your data is in safe hands, and we've got you covered!

We use cookies to personalize your experience. By continuing to visit this website you agree to our use of cookies