Security is important for us. We use SSL and TLS security and file encryption at rest to protect your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure.

Application Security Features

Our application (API) platform includes the set of the following security features:

  • Detailed logs for API calls. Logs include the following data: API endpoint, user agent, IP address, copy of request and response. Sensitive data such as password are automatically redacted from logs. Log retention period may vary depending on your subscription plan;
  • Access to API logs, files, templates are locked for view by the user only. Optional access for tech support purposes can be temporary enabled by a user;
  • Uploaded and generated files are stored under highly randomized file names;
  • Generated files are permanently removed within 1 hour automatically. Expiration period may be decreased or increased up to 24 hours if needed for a specific files;
  • API functions for forced output file removal are available;
  • Built-in secure permanent file storage provides a way to store documents, images and other files for re-use in API. Files from this storage are available for re-use in API only;
  • Functions to open encrypted and password protected PDF files;
  • Functions to apply password protection and encryption to PDF files;
  • Optional IP allow list to restrict access to API and/or UI from predefined IP addresses only;
Availability of selected features may vary depending on your subscription plan.

Data Transmission

Security is important for us. We use forced SSL and TLS security and file encryption at rest to protect your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure.

Data Encryption

Your connections to application and API require Transport Layer Security Secure (TLS) and Secure Sockets Layer (SSL), a cryptographic protocols designed to provide communications security over a computer network. Encryption is used to ensure a high level of security and privacy.  When you upload documents and files, they are transmitted via encrypted connections.

Your files are stored behind a firewall and authenticated against the sender’s session every time a request for that file is made. We enforce the use of industry best practice for the transmission of data to our platform (Transport Layer Security TLS) and data is stored in a SOC 1 Type II, SOC 2 Type I, and ISO 27001 certified data centers. Your documents are stored and encrypted at rest using AES 256-bit encryption.

When a file is generated by our server, it is stored under random name and is permanently removed after 1 hour (until you set longer storage period explicitly). Generated files can also be removed permanently using /file/delete API method at any time.

Data Security

Servers and data are hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:

  • ISO 27001
  • SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II)
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)
  • AWS also provides an environment that enables businesses to comply with HIPAA regulations

Physical Security utilizes ISO 27001, FISMA, HIPAA certified data centers managed by Amazon. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state-of-the-art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon only provides data center access and information to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

For additional information see:

Credit Card Information does not store your credit card information. When you submit your credit card information, it is passed to our payments processor Stripe, a PCI Service Provider Level 1 service or to FastSpring (BrightMarket LCC, USA), our authorized reseller.

Data Deletion

Upon request will work to expunge all customer data and solely owned documents from our systems. You can always delete your account from your profile page. Contact us if you need assistance with data deletion.