2nd Vault is a digital vault for all of your relevant information to be saved and shared in a highly secure and convenient way. How is your information secured? User Encryption Keys Your security starts with a personal encryption key (a complex string of characters). Each unique user key is rotated on a periodic basis to ensure your information is locked until you want to see it. Account Cleanup after Retrieval While putting in a retrieval request, the confidant can delete or keep the associated user data on the platform. The data will be deleted after six months once the data purging is opted for. End-to-end Encryption 2nd Vault will never automatically store information on your device. Your information will be transmitted, stored on our server, and every point in between is encrypted with military-grade SHA-256 encryption. Your information will never be stored or transmitted in plain text. Layered Encryption Your information is also protected with state-of-the-art physical security, multi-factor authentication, and instantaneous backups that are audited regularly by a 3rd party. Layers of security are used to ensure your data is safe, secure, and accessible by you at all times. Your information is never accessible by us. Two Factor Authentication 2nd Vault is committed to securing your data and files and safeguarding your account access. We have implemented two-factor authentication, which sends a unique code to your phone whenever you try to log in from a new device or browser. This additional security measure protects you in the event your password is compromised. No Manual Intervention The account creation and claim process is verified automatically by the system. Our staff does not have access to your data or account except for a unique account ID. So only you and your confidant can access information saved by you. That also means if you misplace your password, only you can recover it. We do not have any mechanism to access your account. Unique Confidant Code The platform generates a unique confidant code when the user adds a confidant to the account. The user will have to share this code with the confidant. This code creates additional security layers for sharing users’ account data and files under strict security protocols. Without this code, the confidant cannot claim or access the account. Manual Verification to Retrieve Account The retrieval form requires the confidant to upload their photo identification document and legal document, which then is manually verified by the 2ndVault team; once the confidant is validated then, the retrieval request is approved, and access is granted to the confidant to download the associated user’s data. This will be as a PDF document. Account Cleanup after Retrieval While submitting a retrieval request, the confidant can delete or keep the associated user data on the platform. The data will be deleted after six months once the data purging is elected.