Documentolog AppOpen in the app
logo

How is Information Security Ensured in Documentolog Solutions?

Documentolog takes the security and integrity of its clients' data very seriously. To this end, we continuously improve our infrastructure. What measures do we use to protect your data while you work in the system? We have outlined 7 key points.

3 min.

08.11.2022

753

Gulzat Temirbayeva

Digital marketing manager

Documentolog takes the security and integrity of its clients' data very seriously.

What measures do we use to protect your data while you work in the system?

We have outlined 7 key points:

- Client digital signature and password data are not stored on Documentolog servers.

When signing a document in the Documentolog EDS, the path and password to the digital signature are requested, but this information does not reach Documentolog servers, as all signing occurs on the user's computer in their browser.

- Documentolog servers are protected against data loss.

All client file data is stored in three copies. Therefore, data availability is ensured even in the event of physical server hardware failure. If file servers fail, data will not be lost.

- The system's fault tolerance reaches 99%.

The system maintains its operability even after one or more components fail.

- Centralized event analysis and monitoring system (SIEM).

The SIEM system collects and analyzes logs from all instances. In case of identified risks, Documentolog administrators respond accordingly.
- Documentolog employees do not have access to client data.

Client data is transmitted via secure communication channels. Therefore, the information is not accessible to Documentolog employees.

- Document viewing is only available with permission.

Each client employee has access only to the information and documents they are permitted to see according to their structure or assigned role.

Two-factor authentication.

The system remembers each session and its metadata. When logging in from a new device or browser, the system requests an access code, which is sent to the email linked to the user's account. All login data is collected and displayed in the user's profile.

This is far from the complete list of measures we implement in our systems.

For more details, you can read the article.

Share the link on social media:

Read more

31.03.2026

The first clients have already been upgraded to d8n.ai

and gained access to new capabilities of the system

18.03.2026

Documentolog Supports the Development of Eco-Hub in Astana

The Documentolog company became a key partner of the Eco-Hub project in Astana – an initiative aimed at the development of ecological culture and sustainable consumption infrastructure in the city.

18.03.2026

Documentolog and UNICON.UZ Discussed Prospects for Cooperation in Digital Solutions

The companies held a working meeting, during which they discussed system integration, information security, and the development of cross-border electronic document management.

Hi! If you have questions, I can help!
Connecting to chat...
Powered byDocumentolog