Documentolog ilovasiIlovada ochish
logo

How is Information Security Ensured in Documentolog Solutions?

Documentolog takes the security and integrity of its clients' data very seriously. To this end, we continuously improve our infrastructure. What measures do we use to protect your data while you work in the system? We have outlined 7 key points.

3 daq.

08.11.2022

751

Gulzat Temirbayeva

Digital marketing manager

Documentolog takes the security and integrity of its clients' data very seriously.

What measures do we use to protect your data while you work in the system?

We have outlined 7 key points:

- Client digital signature and password data are not stored on Documentolog servers.

When signing a document in the Documentolog EDS, the path and password to the digital signature are requested, but this information does not reach Documentolog servers, as all signing occurs on the user's computer in their browser.

- Documentolog servers are protected against data loss.

All client file data is stored in three copies. Therefore, data availability is ensured even in the event of physical server hardware failure. If file servers fail, data will not be lost.

- The system's fault tolerance reaches 99%.

The system maintains its operability even after one or more components fail.

- Centralized event analysis and monitoring system (SIEM).

The SIEM system collects and analyzes logs from all instances. In case of identified risks, Documentolog administrators respond accordingly.
- Documentolog employees do not have access to client data.

Client data is transmitted via secure communication channels. Therefore, the information is not accessible to Documentolog employees.

- Document viewing is only available with permission.

Each client employee has access only to the information and documents they are permitted to see according to their structure or assigned role.

Two-factor authentication.

The system remembers each session and its metadata. When logging in from a new device or browser, the system requests an access code, which is sent to the email linked to the user's account. All login data is collected and displayed in the user's profile.

This is far from the complete list of measures we implement in our systems.

For more details, you can read the article.

Ijtimoiy tarmoqlarda havolani baham ko'ring:

Yana o'qing

31.03.2026

Первые клиенты уже обновлены на d8n.ai

и получили доступ к новым возможностям системы

18.03.2026

Documentolog поддержал развитие Эко-Хаба в Астане

Компания Documentolog стала ключевым партнером проекта Эко-Хаб в Астане — инициативы, направленной на развитие экологической культуры и инфраструктуры устойчивого потребления в городе.

18.03.2026

Documentolog и UNICON.UZ обсудили перспективы сотрудничества в сфере цифровых решений

Стороны провели рабочую встречу, в ходе которой рассмотрели вопросы интеграции систем, информационной безопасности и развития трансграничного электронного документооборота.

Salom! Agar savollar bo'lsa, yordam beraman!
Chat'ga ulanmoqda...
Ishlab chiqilganDocumentolog