Security

Security is built into each File Room.  From the File Room, the Root of the Filing Structure, all User Permissions are "granted" or "denied." 

  • Each User is given a Password.
  • Each User is assigned to one or more File Rooms
  • Within each File Room, each user is granted permission or denied permission to perform the following tasks.

Folders

  • Create - Add new folders
  • Delete - Delete folders and contents
  • Search - Search all folders
  • Rename - Rename existing folders
  • Send to - Send folders to different file cabinets.

Documents

  • Copy - Make copies or duplicated
  • Send to - Send documents to fax, email, printer outside system
  • Import - Import documents from other sources
  • Scan - Scan new documents
  • Print - Print documents but no other send to permissions
  • Edit Cross Reference - Make changes to cross-reference information
  • Delete - Delete documents, (we keep all deleted items for 30 days for recovery)
  • Properties - Document properties-special conditions

Hardware Security

  • 99% uptime
  • 24x7 system monitoring
  • UPS, Generator backup and redundeant power systems
  • Emergency fire suppression
  • Off-site daily backups

Software Data Security

  • Multiple redundent firewalls
  • Daily Data Back-up
  • Load balanced servers
  • Internet security using secure socket layers
  • 24x7 system monitoring
  • UPS, Generator backup and redundeant power systems
  • Emergency fire suppression
  • Off-site daily backups