eFax Security and Confidentiality Overview

eFax Security and Confidentiality Overview

This article confirms the robust security and confidentiality measures implemented within the EMAK e-fax product. We are committed to protecting your sensitive information through strict access controls, encryption, and adherence to Canadian data hosting standards.

Key Security Controls

1. Data Encryption

State

Control

Details

Data In Transit

HTTPS / TLS Encryption

All communication, including portal access and data transfer via the REST API to our carrier, is secured using HTTPS (TLS), preventing eavesdropping or interception.

Data At Rest

AES-256 Encryption

Fax documents (PDFs) are stored in AWS S3 buckets and encrypted using SSE-S3 (Server-Side Encryption with Amazon S3-managed keys), utilizing the industry-standard AES-256 algorithm.

 

2. Data Location and Sovereignty

·       
Hosting Location: All customer data, including fax PDFs, is hosted exclusively in Canada within the AWS ca-central-1 region.

·       
Purpose: This strict adherence to Canadian hosting ensures compliance with data residency requirements.

3. Access Control and Auditing

·       
User-Specific Access: Access to the user portal requires unique user accounts protected by password requirements. Access to documents is strictly on a per-user basis.

·       
Detailed Audit Logging: The system maintains a comprehensive audit trail. All file access, faxes sent, and platform actions are logged and permanently associated with the logged-in user who performed the activity.

·       
Internal Access Control: Strict internal policies and technical access controls are in place to prevent unauthorized access to client data by internal staff. Access is only granted to authorized personnel with a legitimate, documented business need.

4. Data Transmission and Confidentiality

·       
Secure Carrier Integration: We transmit fax data to our carrier (a regulated CLEC) over a secure, encrypted REST API connection, maintaining confidentiality throughout the entire digital path before delivery.

 

Data Retention and Management

·       
User-Defined Policy: Clients have full control over their data lifecycle. While the default retention is perpetual (until manually deleted by the client), users can configure granular, automatic deletion policies.

·       
Retention Options: Available retention periods include 1 day, 7 days, 30 days, 90 days, or 365 days. Once this period expires, the records are securely and automatically purged from the system.

This summary provides assurance that eFax employs robust, industry-standard security controls to maintain confidentiality and protect your data throughout its lifecycle.


    • Related Articles

    • Using Eavesdrop and Call Barge

      Eavesdrop allows managers to silently listen in on an active call from another extension. This can be useful for quality assurance purposes. Call Barge allows managers to speak to the local party, remote party or both parties at the same time. This ...
    • EMAK Telecom Ports and IPs to Whitelist and Firewall Rules

      If your company has special security requirements, access to our services may be blocked on your router or firewall. In this case, you may need to add manual exceptions to allow our services to operate normally. This is most common in Clinics and ...
    • How to use Call Paging

      Call paging is a one-way communication that allows you to speak through the speakerphone of one or more phones simultaneously to make announcements. It is also possible to install paging speakers installed in a waiting room, warehouse, factory floor, ...
    • Alarm Panel Recommendations

      WARNING: Because our phone service relies on your internet connection, EMAK Telecom cannot guarantee that alarm panels will always work reliably. You may face communication issues and if your internet goes offline, alarm communication with your ...
    • Yealink Call Conference

      Yealink phones allow you to conference up to 5 people at the same time (yourself and 4 others). How to Conference Press the Conference soft key during an active call. The call will automatically be placed on hold. Dial the number of the second party. ...