The essential point when choosing the software - not only in the legal industry but in many others - is the fact of the security of the system and how well it protects your data and confidential information. Not the only trust depends on this, but the practical questions like whether it's secure to upload documents to the system, do only me have access to the system, after what time the session in the system will be interrupted, etc.
The Jusnote company strives to provide the highest level of confidentiality of our users and provide the best security of their data while they are using our products. In this article, we're going to explain 5 of the most important principles of security of Jusnote to help you make sure that all your data is only yours.
1. Role-based permissions.
Jusnote allows account administrators to fully control the roles of their employees, thereby limiting access to confidential information of matters, contacts, finances, and other sections of the system. There are currently five roles available in Jusnote:
- Administrator: the user who can make any changes to the system settings, invite and give other users the appropriate access, as well as select other administrators.
- Bank Accounts: the user with this access can see the Accounts tab in the Jusnote sidebar and will be able to add information about current accounts, conduct account transactions, see balances and transactions on bank accounts.
- Reports: the user with this permission can create various reports in Jusnote.
- Invoices: the user with this access can create, edit and delete invoices, as well as register payments in the system without entering the "Accounts" tab.
- User with no permissions: a limited role in Jusnote, the user of which can enter the system and view tasks, events, documents, and matters to which he has access, but will not have access to all other account entities.
These roles help to correctly distribute data among all employees of the law firm and prevent accidental leak and go it to third parties.
2. Password Policy.
Jusnote provides a set of policies to improve account security by assisting users in using strong passwords and the characters they contain. When creating an account, the system warns all users against creating weak passwords or passwords with combinations that can be easily reproduced. The system uses advanced password verification when creating an account and informs users if the password is weak. The password policy is part of the official Jusnote guidelines and is taught as part of information security.
3. Session tracking.
Users frequently ask us why the system from time to time opens the "Your session is ended" pop-up. The fact is that to ensure the highest level of security of lawyers, Jusnote actively uses the session tracking technology and interrupts sessions in case of "abnormal" use of the system, lack of movement (user actions), and undefined operations of the device. Thus, we warn against the possibility for a third party to receive your data under your account.
4. Reliable servers.
We host all the Jusnote data and resources on a reliable and trusted server in Frankfurt am Main. It provides isolation from most types of physical infrastructure and infrastructure that can cause service failures, as well as gives us failure independence, data protection, and user security. It also allows Jusnote to operate reliably without the risk of user information leakage or disruption.
5. Constant system check by cybersecurity specialists
Jusnote is committed to ensuring that our users are as protected as possible when accessing the service. Therefore, we continue checking and updating the system's code and monitor potential vulnerabilities to ensure that your data is always protected. Every year, Jusnote works with cybersecurity professionals to test our software using best practices. Our team also includes professionals in the field of Internet security with vast experience. Jusnote strives to set the standard in "software-as-a-service" customer security.