Your Client Data,
Protected at Every Step.

Estate planning involves some of the most sensitive information your clients will ever share. EstateScribe is built from the ground up to keep it safe.

Marital Status:

Widowed

Phone number:

555/555-555

Address:

1425 Willow Creek Drive Napa,

Your Client Data,
Protected at Every Step.

Estate planning involves some of the most sensitive information your clients will ever share. EstateScribe is built from the ground up to keep it safe.

Marital Status:

Widowed

Phone number:

555/555-555

Address:

1425 Willow Creek Drive Napa,

Independent Security Audit-Currently Underway

Our security program is built in accordance with the SOC 2 framework - a widely recognized standard created by the American Institute of Certified Public Accountants (AICPA). We are currently undergoing a formal SOC 2 Type II audit conducted by an independent firm. Once complete, the report will be available to customers and prospective clients under NDA.

Our Team & Policies

Security starts with our people. Every team member is trained and held to a high standard

Security starts with our people. Every team member is trained and held to a high standard

Formal Security Program

We maintain a written security program that every employee knows and follows. It's built in accordance with the SOC 2 framework- one of the most widely used security standards in the industry.

Formal Security Program

We maintain a written security program that every employee knows and follows. It's built in accordance with the SOC 2 framework- one of the most widely used security standards in the industry.

Formal Security Program

We maintain a written security program that every employee knows and follows. It's built in accordance with the SOC 2 framework- one of the most widely used security standards in the industry.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

Employee Training

Every team member completes security training covering topics like recognizing phishing attempts, protecting passwords, and handling data responsibly.

Employee Training

Every team member completes security training covering topics like recognizing phishing attempts, protecting passwords, and handling data responsibly.

Employee Training

Every team member completes security training covering topics like recognizing phishing attempts, protecting passwords, and handling data responsibly.

Confidentiality Agreements

All team members sign a confidentiality agreement before their first day. We also run background checks on every new hire in accordance with applicable laws.

Confidentiality Agreements

All team members sign a confidentiality agreement before their first day. We also run background checks on every new hire in accordance with applicable laws.

Confidentiality Agreements

All team members sign a confidentiality agreement before their first day. We also run background checks on every new hire in accordance with applicable laws.

Annual Security Testing

At least once a year, we hire an outside firm to try to find weaknesses in our systems - a practice known as penetration testing. This helps us stay ahead of potential threats.

Annual Security Testing

At least once a year, we hire an outside firm to try to find weaknesses in our systems - a practice known as penetration testing. This helps us stay ahead of potential threats.

Annual Security Testing

At least once a year, we hire an outside firm to try to find weaknesses in our systems - a practice known as penetration testing. This helps us stay ahead of potential threats.

Clear Ownership

Responsibility for protecting your data doesn't fall through the cracks. Every security-related role and duty is clearly assigned and documented.

Clear Ownership

Responsibility for protecting your data doesn't fall through the cracks. Every security-related role and duty is clearly assigned and documented.

Clear Ownership

Responsibility for protecting your data doesn't fall through the cracks. Every security-related role and duty is clearly assigned and documented.

How we protect your data

How we protect your data

Your information is encrypted, monitored and stored securely in the United States

Your information is encrypted, monitored and stored securely in the United States

Trusted Hosting

EstateScribe runs on Amazon Web Services (AWS) - the same infrastructure trusted by major banks, hospitals, and government agencies. Learn more about AWS security →

Trusted Hosting

EstateScribe runs on Amazon Web Services (AWS) - the same infrastructure trusted by major banks, hospitals, and government agencies. Learn more about AWS security →

Trusted Hosting

EstateScribe runs on Amazon Web Services (AWS) - the same infrastructure trusted by major banks, hospitals, and government agencies. Learn more about AWS security →

U.S.-Based Storage

All customer data is stored in data centers located within the United States. Your information does not leave U.S. borders.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

U.S.-Based Storage

All customer data is stored in data centers located within the United States. Your information does not leave U.S. borders.

Always Encrypted

Your data is encrypted when it's stored and when it's moving between your device and ours - meaning it's unreadable to anyone who shouldn't have access.

Always Encrypted

Your data is encrypted when it's stored and when it's moving between your device and ours - meaning it's unreadable to anyone who shouldn't have access.

Always Encrypted

Your data is encrypted when it's stored and when it's moving between your device and ours - meaning it's unreadable to anyone who shouldn't have access.

Continuous Monitoring

We actively scan for vulnerabilities and monitor our systems around the clock. If something looks off, our team is alerted immediately.

Continuous Monitoring

We actively scan for vulnerabilities and monitor our systems around the clock. If something looks off, our team is alerted immediately.

Continuous Monitoring

We actively scan for vulnerabilities and monitor our systems around the clock. If something looks off, our team is alerted immediately.

Backups & Recovery

Your data is regularly backed up so nothing is lost in the event of a hardware issue. We have monitoring in place to catch service disruptions quickly.

Backups & Recovery

Your data is regularly backed up so nothing is lost in the event of a hardware issue. We have monitoring in place to catch service disruptions quickly.

Backups & Recovery

Your data is regularly backed up so nothing is lost in the event of a hardware issue. We have monitoring in place to catch service disruptions quickly.

Incident Response

If a security incident were to occur, we have a documented plan with clear steps for containment, resolution, and communication - so you're never left in the dark.

Incident Response

If a security incident were to occur, we have a documented plan with clear steps for containment, resolution, and communication - so you're never left in the dark.

Incident Response

If a security incident were to occur, we have a documented plan with clear steps for containment, resolution, and communication - so you're never left in the dark.

Who can access what

Who can access what

We limit access to your data to only the people who need it

We limit access to your data to only the people who need it

Strict Login Security

Access to our internal systems requires multiple layers of verification, including single sign-on and two-factor authentication. Strong password requirements are enforced across the board.

Strict Login Security

Access to our internal systems requires multiple layers of verification, including single sign-on and two-factor authentication. Strong password requirements are enforced across the board.

Strict Login Security

Access to our internal systems requires multiple layers of verification, including single sign-on and two-factor authentication. Strong password requirements are enforced across the board.

Need-to-Know Access

Team members only get access to the systems and data they need for their specific role - nothing more.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

Need-to-Know Access

Team members only get access to the systems and data they need for their specific role - nothing more.

Quarterly Reviews

Every quarter, we review who has access to what. If someone's role has changed or they no longer need access, permissions are adjusted or removed.

Quarterly Reviews

Every quarter, we review who has access to what. If someone's role has changed or they no longer need access, permissions are adjusted or removed.

Quarterly Reviews

Every quarter, we review who has access to what. If someone's role has changed or they no longer need access, permissions are adjusted or removed.

Password Management

All company devices include a password manager so our team uses strong, unique passwords for every service-reducing the risk of compromised accounts.

Password Management

All company devices include a password manager so our team uses strong, unique passwords for every service-reducing the risk of compromised accounts.

Password Management

All company devices include a password manager so our team uses strong, unique passwords for every service-reducing the risk of compromised accounts.

How we manage Risk

How we manage Risk

We regularly evaluate risks to our systems and carefully vet every vendor we work with

We regularly evaluate risks to our systems and carefully vet every vendor we work with

Annual Risk Reviews

At least once a year, we conduct a thorough review to identify potential risks to our organization and to your data - including fraud and emerging threats.

Annual Risk Reviews

At least once a year, we conduct a thorough review to identify potential risks to our organization and to your data - including fraud and emerging threats.

Annual Risk Reviews

At least once a year, we conduct a thorough review to identify potential risks to our organization and to your data - including fraud and emerging threats.

Vendor Vetting

Before we work with any new vendor or service provider, we evaluate their security practices. We don't let outside companies near your data unless they meet our standards.

Outside Security Reviews

We don't just check our own work. Independent security firms evaluate our systems and practices to make sure our protections hold up.

Vendor Vetting

Before we work with any new vendor or service provider, we evaluate their security practices. We don't let outside companies near your data unless they meet our standards.

Step into the future.

See how EstateScribe is helping lawyers work faster, stay organized, and deliver a better client experience.