Secure by design.

Our platform uses industry-leading security and encryption protocols to safeguard data during every step of the process.

Transparent by nature.

Consent-based sharing keeps ownership of investor data in the hands of the investor.

Built securely from the start

“Secure by Design” means that every step in our development was informed by the question “how can we build this in the most secure way possible?”.

LEADING ENCRYPTION PROTOCOLS

Data is encrypted on the user's endpoint prior to transmission and protected with industry-recognized transport security protocols TLS 1.3 and 1.2

TWO-FACTOR AUTHENTICATION

Two-factor authentication is in place for all users to mitigate the risk of individual account breaches

Empowering investors through data ownership

UNIVERSAL IDENTITIES

The simple & secure way to share investor data

LockDocs acts as the data custodian for a user’s digital identity profile, called a Universal Corporate Identity™️ for entities or a Universal Personal Identity™️ for individuals.

DATA TRANSPARENCY

Consent-based data sharing system

The ownership of user data remains in the hands of the investor – no data is shared with a third-party without explicit consent, and the platform offers a complete log of which providers have access to each piece of data.

Frequently asked questions about privacy & security

IS USER DATA SAFE WHEN AT REST?

Identity data is stored in our encrypted cloud vault when at rest and is encrypted before it is transmitted to us for storage. The encryption takes place right in the user’s web browser - a user’s passcode is part of what makes up their unique encryption key. Without access to this passcode, there is no way to decrypt the data. Remember to practice good password security habits when using LockDocs - passcodes should be unique, difficult to guess, free from personal information, and never be shared with anyone else.

HOW IS USER DATA SECURED?

Data is encrypted by the user prior to transmission and vaulting using AES256. LockDocs also supports strong authentication protocols, including:

IS THE PLATFORM BEING MONITORED FOR ATTACKS?

LockDocs has a fully-staffed security monitoring service to review and maintain platform security 24 hours a day. Our team monitors both operational and developmental environments, ensuring platform integrity from the moment the code is conceived to the moment that user data is transferred to the intended recipient..

HOW IS USER DATA SECURED?

All data encipherment keys are maintained in a secure vaulting facility called a Hardware Security Module.

HOW DO YOU ENSURE THAT THE ADDITION OF NEW CODE DOES NOT CREATE PLATFORM VULNERABILITIES?

All environmental modifications for the platform undergo strict reviews – this includes code submissions. Our platform code is subject to rigorous review in line with industry best practices and undergoes stringent security testing prior to inclusion in our development or production environments.