Security

security icon

izidocs is designed to keep your information secure

Authentication

  • Using username and password or by connecting to Active Directory
  • Password strength defined by administrator
  • Forced password reset at predefined intervals
  • User log out after preset interval of inactivity
  • Login of certain user groups only allowed from specific IP addresses
  • Possibility to use two-factor authentication

Information integrity, compliance

  • Records all document versions
  • Records all user actions
  • Permanent copy of all emails
  • Permanent copy of all documents, which are recoverable even when they are deleted
  • Encryption of data at rest and in transit
  • Retention/destruction policies according to legal requirements
  • GDPR compliant

Access rights

  • Granular security policies per folder/subfolder with separate rights for
    • Create
    • Edit
    • View
    • Move
    • Delete
  • Access rights are defined per
    • user
    • user group
    • user role
  • Access rights can be based on user location
  • Possibility to provide time limited access to specific folders