How Secure is my Information at
                    LegalWills.ca?
                ![Security Assured]() 
                
                    This site uses state-of-the-art digital encryption and security technologies
                to protect the privacy and security of our member information and has specific
                security measures in place to protect the loss, misuse and alteration of
                the information under our control.
                
                
                    All data passing from your computer to
                LegalWills.ca
                        is authenticated and encrypted using 256-bit Secure Socket Layer (SSL) encryption
                    using technologies provided by Comodo. This is the most advanced
                level of encryption available today, and it means that any information sent
                from your computer is scrambled in a way which makes it completely unintelligible
                if intercepted. When you are on a secure section within the web
                site (i.e. after you have logged in as a member), a padlock will appear on your web browser. This is your assurance that
                the encryption is in place and that you are communicating across a secure
                link.
                
                
                    We do not store any of your credit card information. 
                All credit card transactions are processed through a third party secure
                gateway, and the information your provide is only used for making the current
                transaction.  No information about your or about your credit card is
                ever stored on our website, in our databases, on our web servers, or on
                the secure gateway server.
                
                
                    All sensitive personal information is stored in a
                highly encrypted format on our server.  We use an industry standard
                high security streaming-encryption algorithm known as "RSA" to encrypt all
                sensitive personal information before it is stored online. RSA is a public-key
                cryptosystem developed by MIT professors Ronald Rivest, Adi Shamir and Leonard
                Adleman. (To give you a feeling for the level of security provided by this
                encryption, it has been estimated that with the most efficient algorithms
                known to date, it would take a computer operating at 1 million instructions
                per second over 300 quintillion years to break the encryption.)  Also,
                the encryption method used ensures that the only way possible to access
                and view the sensitive personal information stored here by a
                LegalWills.ca
                    member is by using a private internal encryption key which is unique for
                every member.  Our software algorithms ensure that the encryption and
                decryption of a member's sensitive personal information can only be performed
                by the member themselves, or by those designates to which the member has
                provided a separate unique key known as a "Keyholder® ID".  It is not
                even possible for the operators of this website to decrypt a member's sensitive
                personal information without knowledge of this encryption key. 
                Note that some services require temporary decryption of a member's documents
                as part of the operation of providing that service. 
                For example, if the member wants to have their Will reviewed by one of our legal
                professionals, or wants to have their documents printed and mailed to them, then
                the software will automatically decrypt these documents as part of the member's
                instructions to have these services performed.
                
                
                    We also provide 2-Factor Authentication (2FA) and recommend that all members turn on this
                    feature within their account, to protect against unauthorized access.
                    2FA works by adding an additional layer of security to your online account. 
                    It requires an additional login credential – beyond just the UserID and Password – to gain account access. 
                    Getting that second credential requires access to something that belongs to you, such as
                    a cell phone and/or a personal email address. 
                
                
                    As an additional security measure, all successful
                and unsuccessful attempts to login to a member's account are logged
                    in our database along with date/time stamps, IP addresses, and other detectable
                information from the user.  This information will be used for law enforcement
                purposes and for the protection of our members should there be any suspicion
                of unauthorized access to our database.
                
                
                    Furthermore, we offer members the option of receiving
                an email alert message whenever their sensitive personal information is
                accessed, or attempted to be accessed, using a valid key.  If unauthorized
                access is suspected, clicking a link within the email will immediately disable
                access to the member's sensitive personal information for that key, until
                the member re-enables the access themselves, or until we are contacted by
                the member and provided with specific information validating their identity.
                
                
                    To protect against catastrophic data loss, daily backups
                are performed on each of our servers. Hence, if any one of our servers experienced technical difficulties,
                our member data would not be at risk.
                
                
                    We also employ a number of physical security mechanisms
                to ensure the physical protect of your information.  Physical protection
                of our systems includes:
                
                
                    - 
                        
                            Fire detection and fire suppression systems with
                    dry pipe pre-action sprinkler systems
                         
- 
                        
                            N + 1 redundant power supplies, providing dual power
                    feeds and backup batteries, water coolant systems and generators
                         
- 
                        
                            N + 1 redundant climate control, providing primary
                    and backup chiller units, cooling towers, and water storage
                         
- 
                        
                            Local network operations center (NOC) for monitoring
                    all data center operations
                         
- 
                        
                            24x7 monitoring and support of network connection
                    and server availability
                         
- 
                        
                            24x7 uniformed guard service with interior and exterior
                    closed-circuit television surveillance
                         
- 
                        
                            Electronic access at all data center entrances, including
                    biometric hand scanners
                         
- 
                        
                            Electronic key management systems and individually
                    keyed cabinets
                         
                    We perform ongoing security vulnerability and penetration testing.
                    Our database is scanned weekly for security and vulnerability issues, and our web server is scanned monthly 
                    to ensure it is fully protected against any new and emerging security vulnerability threats.
                
                
                    The most important security element of any service is the team that runs it.
                    We do not use any temporary staff, nor do we use any offshore or outsourced staff.
                All of our services were developed locally, and no contract staff were used in the coding of our site.
                Furthermore, every member of our support team is a full time employee and has been with the company for over five years.
                We all love working here and are here to help you.
                
                
                    As you can tell, we take the
                security and privacy of all of our member information very seriously.
                
                
                    Don't take our word for it. Try it out for yourself.  We
                have worked with lawyers in Canada to bring you these services and to ensure
                that they are of the highest quality.  Best of all, you can
                try all of our services right now for free, without any commitment. Just click on a link below
                to get started. Try us out. Then decide if you want to pay.