• Security

We take security seriously!

Protecting customer data is at the core of our business. We are mindful that our products are utilized in every major business vertical, including those requiring elevated levels of security, such as healthcare organizations and state or local governments.

  • Our solutions employ multiple layers of data encryption both at rest (AES) and in transit (SSL)
  • We exceed HIPAA / HITEC and PCI standards for securing personal data / financial transactions
  • Our  data centers are independently audited each year for SSAE 16 SOC I/SOC II compliance
  • Employees are subject to pre-employment criminal background checks and continued audits
  • All of our office locations are secured with  a state-of-the-art access control card system

LEARN MORE

Install on any Android, iOS or Windows device.

Our secure online forms are designed to work in conjunction with common device platform security measures including:

  • Username/Password Combination
  • Local and Domain Policy Settings
  • Antivirus Software
  • GPS/Asset Tracking Applications
  • Biometric Hardware
  • Mobile Device Management platforms

Mobile Forms Security Architecture

Our software protects user data from the point of origination to its final destination during the following steps:

Application Access

Our application may be configured to require additional user authentication after basic device authentication has been satisfied.

Data Transport

Each form packet (RFI) created and sent is placed into a 256 Bit AES encrypted digital envelope for transmission at the application level.

Local Data Storage

Mobile Forms takes advantage of OS platform encryption and utilizes industry best practices to encrypt data at rest in the local app spaces.

Remote Device Management

If a device is lost or stolen, Field2Base support can send a “kill pill” to the client device permanently disabling access to the application.

Remote User Management

All Field2Base customers will be given access to the Admin Portal which allows administrators to monitor and manage users and activities.

Customer Data Separation

By default, customer data is divided into two separate database tables: (1) Logical Separation and (2) Physical Separation.