Security of your information is our primary concern

Ensuring that your confidential and sensitive information is protected at all times is one of our most important concerns. 

security

Data Security

Passwords

The system enforces strong passwords that may include characters, digits, special characters etc. It is up to the user to ensure that the confidentiality of the password, and user ID is maintained. When combined with Multi-Factor Authentication, it provides for extremely secure access to the system. No employees or administrators will have access to this information and you should change passwords on a regular basis. Should you forget your user ID or password, you can use the system’s Forgot Password feature to reset it.

Encryption

All data is encrypted, at rest, using AES-256 with a public key to encrypt data and a private key to decrypt it. Each user will have a unique key. All data communication is also encrypted, in transit, using HTTPS with SSL/TLS with a 2048 to 4096-bit certificate to determine the public key size.

ssl

Data Sovereignty

Protecting Your Privacy Across Borders

Data sovereignty refers to the concept that digital information is subject to the laws of the country in which it is located. This means that the privacy and security of your data are governed by the regulations of the country where it is stored. Data sovereignty impacts your privacy, security, and legal rights. Different countries have varying laws regarding data access, storage, and protection. Ensuring your data is managed in compliance with local laws can protect you from unauthorized access and misuse.

Inheritus complies with international data protection standards, such as GDPR in Europe, PIPEDA in Canada, CCPA in California and more. International users’ data are automatically stored in locations to ensure compliance with local regulations.

Operations

We are guided by industry best practices and follow them in order to protect your sensitive and confidential data and documents. These practices include software vulnerability testing, intrusion detection and cyber security audits. Critical software updates and patches are provided immediately on an as-required basis by our systems personnel.

Our online environments are provided by world-class service providers such as Amazon, Google and Microsoft. These environments are monitored on an ongoing basis for security issues and all updates, fixes and patches are applied as required.

Business-tools

Role Based Access Control

The software uses Role-Based Access Control to allow access to certain features and functions by the role of the individual accessing the system. This control maintains confidentiality of your sensitive data and documents and restricts access to only those persons you would like to have access using cryptography such as SHA-256. Employees or administrators can only access non-sensitive data in order to provide support and assistance to users.

The system uses an invitation-only approach to document sharing with Trusted Advisors, Estate Trustees and other contacts and this sharing can be started and terminated at anytime depending upon the needs of the user.

Multi-Factor Authentication

Multi-Factor Authentication (MFA) or Two Factor Authentication allows you to add an additional layer of security to your data and use of the system. You can use the Google or Microsoft Authenticator Apps or request a secure code to be sent to you via email or SMS Text Message. Use this code in conjunction with your login credentials to securely access the system. Should your password be lost or compromised, no one will be able to access your account since you’ll be the only person with the secure code required for successful access.

Each time your account is accessed or a password is changed, you will be notified and the system tracks all usage for auditing and reporting.

MFA
group-of-professionals

Standards Compliance

  • PIPEDA (Canada)
  • Freedom of Information and Protection of Privacy Act (Regional)
  • GDPR (European Union)
  • HIPPA (USA)
  • Safe Harbor Privacy Principles
  • TBS Guardrails & Government of Canada Security Control Profile
  • ISO 27001:2005
  • ISO 27002 and ISO 27005
  • SOC 1 and 2 Type II

Measurement & Reporting     

We use standardized compliance techniques in conjunction with our Auditors. We identify and assess compliance issues based on our policies and procedures and analyze our risk and exposure. We follow-up and do compliance gap analysis and evaluate best practices for risk mitigation. Finally, we fix identified issues and continually monitor to ensure that there are no repeating issues.

Our security features include

Leading-edge security technology, data and analytics tools

Strong internal controls like firewalls and email security software

Managing security threats 24/7/365
 

Mandatory employee training on Cybersecurity practices

Speaker-Contact

Need More Details? Lets Connect!

Our Sales team can help with reliable and accurate answers to your questions and concerns.

Richard Sanders, CPA, CA, CBV is a seasoned professional and Partner at a leading global Accounting firm, bringing over 35 years of invaluable experience to the advisory board. With a background in Accounting & Finance, he has demonstrated a keen sense of the challenges to business management and growth throughout his career.

Having held key partnerships with several Accounting firms, Richard has a proven track record of success in advising businesses in areas ranging from Audit to Internal Controls, Tax and Valuations. His strategic thinking has been crucial in guiding organizations through periods of startup and growth.

As an advisory board member, Richard provides strategic counsel and invaluable insights on Audit, Finance and Accounting. His expertise and vision play a vital role in shaping the organization’s strategy and driving sustainable growth over the long term.

Richard holds a Bachelor of Accounting & Business Management from the University of Toronto. He continues to stay at the forefront of the Accounting industry’s developments through ongoing education and professional development initiatives.

Richard’s passion for success and his commitment to guiding businesses make him an invaluable asset to the advisory board.

Bob is a distinguished leader in Software M&A, bringing over 40 years of invaluable experience to the advisory board. With a background in the Canadian & US Information Technology sectors, he has demonstrated a keen understanding of the challenges driving business innovation and fostering growth throughout his career.

Having held prominent roles within the Fortune 500, Bob has a proven track record of success in supercharging business growth. His strategic acumen and forward-thinking approach have been instrumental in guiding organizations through periods of change and transformation.

As an advisory board member, Bob provides strategic counsel and invaluable insights on business development, partnerships and strategic alliances. His expertise and vision play a vital role in shaping the organization’s long-term strategy and driving sustainable growth.

Bob holds a BSc in Physics and Mathematics from the University of Ottawa. He continues to stay at the forefront of the Information Technology industry’s developments through ongoing education and professional development initiatives.

Bob’s passion for excellence and his unwavering commitment to the Software Industry make him an invaluable asset to the advisory board, driving the organization’s mission and vision forward with clarity and purpose.

Request Quote