Encryption Protocols

We employ established security and encryption protocols, such as SSL (Secure Sockets Layer), to ensure the safe collection and storage of personal information.

Cryptography SHA256

Cryptography SHA256 is a type of cryptographic hash function that is capable of creating a unique fixed-length output of 256 bits. It is frequently used for tasks such as digital signatures, data integrity verification, and authentication. This function can verify the authenticity and integrity of data, ensuring that it has not been modified or tampered with, and that it comes from a reliable source.

Data Encrypted at Rest

Data Encrypted at Rest refers to the process of encrypting data that is stored or archived in a computer system or other digital storage device. This encryption ensures that the data remains secure even if the physical storage device is compromised or stolen. The encryption process involves converting the data into a secret code that can only be deciphered using a decryption key. This helps to protect sensitive information such as personal data, financial records, and confidential business data from unauthorized access and theft.

File Storage

File storage links with expiration date and time using a signed URL is a security feature that allows files owners to grant temporary access to a private files. When generating a signed URL, the owner can set an expiration date and time after which the URL will no longer be valid. This provides an additional layer of security by ensuring that access to the object is time-limited and cannot be used beyond a certain period.

The signed URL are generated for a specific user, and it grants access only to the specified file. This helps to prevent unauthorized access to the files and protects against potential data breaches or leaks. With this feature, files can share files with authorized users without compromising the security of their data.

Physical Security

Irvine Data Center ( is designed to provide CaseJacket with the secure and reliable environment needed to store and manage our critical data. With advanced security measures such as biometric access control, 24/7 surveillance, and fire suppression systems, Millsys data centers offers CaseJacket peace of mind knowing our data is safe and secure. With redundant power and cooling systems, as well as backup generators, data centers ensure that CaseJacket can access their data even in the event of a power outage or other disruption.

Disaster Recovery Plan

This Disaster Recovery Plan (DRP) outlines the steps to recover from a catastrophic event that may affect the availability of The plan focuses on recovery procedures in case of data loss or infrastructure failure, with the goal of minimizing downtime and data loss.

  1. Database Backup: The database is backed up twice a day to AWS S3, providing a reliable source of data recovery.
  2. Database Sync: The database is synchronized with the development server once a week to ensure up-to-date data.
  3. Application Files: Application files are stored in a private GitHub repository, ensuring code preservation.
  4. Staging Server: Application files are published to a staging server, facilitating a rapid deployment environment.
  5. Recovery Time Objective (RTO): The target recovery time is 12 to 24 hours to bring up a new server and database.