Documentolog AppOpen in the app
logo

How is Information Security Ensured in Documentolog Solutions?

Documentolog takes the security and integrity of its clients' data very seriously. To this end, we continuously improve our infrastructure. What measures do we use to protect your data while you work in the system? We have outlined 7 key points.

3 min.

08.11.2022

477

Gulzat Temirbayeva

Digital marketing manager

Documentolog takes the security and integrity of its clients' data very seriously.

What measures do we use to protect your data while you work in the system?

We have outlined 7 key points:

- Client digital signature and password data are not stored on Documentolog servers.

When signing a document in the Documentolog EDS, the path and password to the digital signature are requested, but this information does not reach Documentolog servers, as all signing occurs on the user's computer in their browser.

- Documentolog servers are protected against data loss.

All client file data is stored in three copies. Therefore, data availability is ensured even in the event of physical server hardware failure. If file servers fail, data will not be lost.

- The system's fault tolerance reaches 99%.

The system maintains its operability even after one or more components fail.

- Centralized event analysis and monitoring system (SIEM).

The SIEM system collects and analyzes logs from all instances. In case of identified risks, Documentolog administrators respond accordingly.
- Documentolog employees do not have access to client data.

Client data is transmitted via secure communication channels. Therefore, the information is not accessible to Documentolog employees.

- Document viewing is only available with permission.

Each client employee has access only to the information and documents they are permitted to see according to their structure or assigned role.

Two-factor authentication.

The system remembers each session and its metadata. When logging in from a new device or browser, the system requests an access code, which is sent to the email linked to the user's account. All login data is collected and displayed in the user's profile.

This is far from the complete list of measures we implement in our systems.

For more details, you can read the article.

Share the link on social media:

Read more

07.11.2025

Documentolog поддержал талантливых студентов Energo University

Сегодня в Energo University прошла торжественная церемония вручения именных стипендий от индустриальных партнёров

07.11.2025

АЗРК отменило приказ о расследовании в отношении Documentolog

Documentolog получил официальное подтверждение исполнения решения суда апелляционной инстанции, вступившего в законную силу: Агентство по защите и развитию конкуренции Республики Казахстан (АЗРК) отменило приказ о начале расследования в отношении компании.

30.10.2025

The Court ruled on the illegal activities of AZRK in relation to Documentolog

An official court ruling has determined the focus in the matter concerning the AZRK's activities against Documentolog.