• Security

We take security seriously!

At Field2Base, we take serious security measures when hiring new employees, including pre-employment criminal background checks. Additionally, our corporate headquarters is secured with a state-of-the-art access control card system to keep our offices protected. The same approach to security is applied across our entire line of mobile form software solutions. We are mindful that our products are utilized in every major business vertical, including those requiring elevated levels of security, such as healthcare organizations and state or local governments.

Mobile Forms delivers real-time data with end-to-end encrypted architecture hosted in a series of SAS70 Type II/SSAE 16/SOC I/SOC II certified network operation centers. These centers are located within the United States and are certified for 99.999% up time and reliability.


Install on any Android, iOS or Windows device.

Our secure online forms are designed to work in conjunction with common device platform security measures including:

  • Username/Password Combination
  • Local and Domain Policy Settings
  • Antivirus Software
  • GPS/Asset Tracking Applications
  • Biometric Hardware
  • Mobile Device Management platforms

Mobile Forms Security Architecture

Our software protects user data from the point of origination to its final destination during the following steps:

Application Access

Our application may be configured to require additional user authentication after basic device authentication has been satisfied.

Data Transport

Each form packet (RFI) created and sent is placed into a 256 Bit AES encrypted digital envelope for transmission at the application level.

Local Data Storage

Mobile Forms takes advantage of OS platform encryption and utilizes industry best practices to encrypt data at rest in the local app spaces.

Remote Device Management

If a device is lost or stolen, Field2Base support can send a “kill pill” to the client device permanently disabling access to the application.

Remote User Management

All Field2Base customers will be given access to the Admin Portal which allows administrators to monitor and manage users and activities.

Customer Data Separation

By default, customer data is divided into two separate database tables: (1) Logical Separation and (2) Physical Separation.