|eLawSoftware is 100% web-based. This means that all of your information, as well as your client’s information, is stored outside of your personal computer. Due to this, security is our top priority. There are two different types of security involved with internet programs – one is the access to your information and the other is the safety of all saved information.|
Accessing your office database
We want our clients to access their information quickly and easily, but do not want to afford outsiders the same convenience. Therefore, we have layered front-end security measures in place to maintain access security. There are application controls that, as a client, you set up to manage who can use which aspects of the program. There is also a page content security measure in place, so that you cannot view our web site through your cache. Once logged in to your database, your IP address is recorded, and all information is transferred at the highest possible encryption.
We use the highest possible SSL (Secure
Socket Layer) encryption to transfer information over our servers. Those
servers are kept in a state-of-the-art data center, who’s design, policies,
and staff were selected to ensure the complete safety of the information
stored there. eLawSoftware runs redundant servers, switches, routers,
firewalls, and paths so that in the event one goes down, your information is
not effected. We have multiple backbones to the internet, allowing data to
be routed the fastest way possible between your workstation and our servers.
On top of the software and hardware we have in place, the data center is
also monitored by their staff 24 hours a day, 365 days a year, so that if
something were to happen that would effect your information, we are notified
Despite all our efforts related to security, a breach may occur. Technology relating to Internet security is evolving rapidly, as are ways to bypass it. Although we use state of the art security measures and take every reasonable effort to keep up with developments in Internet security, there is always the possibility that someone will find a way to gain unauthorized access to any system, including ours.
Clients should contact us immediately if any unauthorized access is identified, even if there does not appear to be any harm done or information lost. It is our policy to investigate all incidents and, if needed, report them to the proper authorities. Electronic theft is a crime, and if we suspect that someone has attempted or committed it, we would like to have your cooperation in taking the appropriate actions.