Secure by Design

LockDocs is designed with a security first mentality – but what does this really mean? Simply put, our platform was built from the ground up by asking one vitally important question at each and every stage of our development: “How can we build this in the most secure way possible?”.

Security Overview

Our platform uses industry-leading security and encryption protocols to ensure that user data is safe and secure during every step of the process. LockDocs is built with an end-to-end encryption compatible framework and all data is stored in an encrypted vault when at rest. To ensure data privacy and integrity during the sharing process, data is encrypted on the user's endpoint prior to transmission and protected with industry-recognized transport security protocols TLS 1.3 and 1.2. We’ve also considered the human factor in the security equation - two-factor authentication is in place for all system users to mitigate the risk of individual account breaches.


Are you seeking more in-depth information on the systems LockDocs uses to ensure the security, privacy, and integrity of user data? Explore some of our frequently asked security questions below.

Security FAQ


What does “end-to-end-encryption” mean?

End-to-end data encryption is a means of encrypting data to ensure that it cannot be intercepted or accessed by a malicious “middleman” at any point in the transmission process. This style of encryption requires two distinct layers: data encipherment (encryption) and authentication (identity verification). These two layers work in tandem to ensure that only the intended recipient is capable of accessing user data.

Is user data safe when at rest?

Identity data is stored in our encrypted cloud vault when at rest and is encrypted before it is transmitted to us for storage. How does this work?. The encryption takes place right in the user’s web browser. A user’s passcode is part of what makes up their unique encryption key - without access to this passcode, there is no way to decrypt the data. This means it is all the more important to practice good password security habits when using LockDocs. Passcodes should be unique, difficult to guess, and free from personal information – and login information should never be shared with anyone else.

How is user data secured?

Data is encrypted by the user prior to transmission and vaulting using AES256.


LockDocs also supports strong authentication protocols, including: 

- Multi-Factor Authentication for all system users

- IP Address Whitelisting 

- Hardware token (FIDO2)

Is the LockDocs platform being monitored for attacks?

LockDocs has a fully staffed security monitoring service to review and maintain platform security 24 hours a day. Our team monitors both our operational and developmental environments, which ensures our platform integrity from the moment the code is conceived to the moment that user data is transferred to the intended recipient.

Are your cryptographic keys stored securely?

All data encipherment keys are maintained in a secure vaulting facility called a Hardware Security Module.

How do you ensure that the addition of new code does not create platform vulnerabilities?

All environmental modifications for the platform undergo strict reviews – this includes code submissions. Our platform code is subject to rigorous review in line with industry best practices and undergoes stringent security testing prior to inclusion in our development or production environments.