InTouch Conveyancing Software Logo

InTouch Case Management Software - Security Practices

Trusted By

Conveyancing Melbourne, Victoria, First Class Legal
Conveyancing Solicitors in Lincoln, Newark & Grantham - Bird & Co
Murray Hills Solicitors, East Yorkshire
Right Choice Conveyancing – Property Conveyancing
Expert Jersey Lawyers, Advocates and Solicitors | Parslows Jersey
Winston Solicitors Leeds, Law Firm Leeds, Leeds Solicitors
Fletcher Longstaff - Award Winning Conveyancing
Offering first-class residential conveyancing service. Evolve Law is an exciting law firm offering first-class residential conveyancing services to its clients.
Client focused solicitors offering exceptional service
Our residential property lawyers have a reputation for efficiency and excellence, as well as being friendly and approachable, and most of their work comes from satisfied clients who return to us time and time again. That coupled with recommendations from estate agents makes us one of Gloucestershire’s leading firms offering conveyancing services.
Massers Solicitors have been providing legal advice for over 100 years.
The Scottish Estate Agents & Solicitors you can rely on
Terence Willey & Co is a family Firm drawing on over 50 years experience in Law. We have three offices on the Isle of Wight.
A family run law firm specialising in residential conveyancing
Residential Property Solicitors in Kent
Kempton Redman Law are a well known and long standing Solicitors based in County Armagh, with offices in Dungannon, Armagh, Lurgan & Portadown. We are trusted by the local community to provide expert legal advice on Property, Wills, Family and Business law
Licensed Conveyancers in Nottingham

Here at InTouch we take our information and Security practices seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data remains secure.

We operate a SaaS (Software-as-a-Service) model which means we look after all the nuts and bolts of the data security operations, pro-actively updating, maintaining and monitoring the system, thereby ensuring that your data is as secure as it possibly can be.

We are continually improving our security by monitoring our procedures and infrastructure to keep up to date with the industry.

Below we give you an overview of some of the things we do to keep you and your customers’ data safe.

Microsoft Azure

InTouch is hosted on Microsoft Azure cloud servers this gives us a number of benefits when it comes to information security, disaster recovery and business continuity. You can read more in-depth about it on Microsoft’s own website here. Below we outline a number of the benefits this will have for your organisation.

Secure Case Management Hosting
Secure Case Management Location Verification

Geo Replication (GeoR)

We use the latest GeoR backup methods available from Microsoft. At any one time 2 different instances encompassing all data and code exists. These are spread across two sites in the UK (serving the UK and Channel Islands) and two in Australia, meaning if one goes down we can get the service up and running again with very little disruption.

In the event of a major regional catastrophic disaster or outage (earthquake, power outages etc), we have the ability to recover from a 1-hour old geo-redundant store that is located physically in a different Microsoft data centre.

This allows InTouch to offer unprecedented business continuity.

ISO 27001 Certified Data Centres

Microsoft Azure Data Centres comply with UK ISO 27001 standard for information security management, which includes people, processes, and IT systems. Microsoft also certifies for a number of other certifications, to find a complete list of compliance certifications please visit the Trust Centre.

This means only authorised personnel can access the servers.

ISO27001 Conveyancing Software
Conveyancing Information Security

End-to-End Encryption

InTouch forces all communication over HTTPS for all services, including our public website, which is the protocol for secure communication over the Internet that mitigates against man-in-the-middle attacks and eavesdropping.

We regularly audit the details of our implementation: the certificates we serve, the certificate authorities we use, and the ciphers we support.

This means communication between your device and InTouch is encrypted in both directions. You can see this yourself when using InTouch, if you click on the padlock to the left of the address bar.

We also deploy Transparent Data Encryption (TDE) which helps protect against malicious activity by performing real-time encryption and decryption of the databases, associated back-ups, and log files using symmetric key encryption.

This means that even in the unlikely event of a 3rd party gaining physical access to our servers, they still won’t be able to read the data.

Penetration Testing

One of the best ways to defend against cyber-attacks is to try and hack yourself first. This is why InTouch is regularly tested by Tinfoil Security who continually test the system for vulnerabilities. Any issues are flagged and immediately dealt with to keep your data secure.

Conveyancing Information Security

Trusted By

Evolve Law conveyancing software testimonial

"We have no regrets whatsoever about changing case management systems and would urge others to take a look at what InTouch can do."

Marc Lansdell

Director

Parslows Jersey in the Channel Islands use InTouch conveyancing software

"The simplicity of the InTouch conveyancing software design, all adds to a platform that has greatly improved our clients property transaction experience."

Carl Parslow

Director

Easy to use conveyancing case management system

"Your product is awesome. One which is lesser-known in the conveyancing world but far simpler & efficient than the other 16 I've worked with."

Anza Services LLP

Partner

Conveyancing System

User Based Information Security

Through the InTouch user interface you can control which users are able to perform certain actions within the system. For example you might want to restrict certain tasks to only supervisors or have only cashiers being able to raise invoices. You can also easily deactivate and reactive any users as needed.

This reduces a number of risks such as compliance risk, fraud risk, and risk of business process corruption.

Reputation Based Security

We utilise CloudFlare’s network of over 2 million websites to collaboratively identify and block threats. When something malicious occurs on one website, the origin of that malicious attempt is then blocked for everyone across the network. CloudFlare has the largest network of its kind which gives us a tremendous ability to block an attack before it starts.

Cloudflare Security for Case Management
InTouch Case Management Software

Two Factor Authentication

If you choose to set up two factor authentication (also commonly known as 2FA), it will require your users to sign in not only with their passwords but also with a code sent to their dedicated mobile device. This means only people with access to both the username, password and that specific device are able to access the system.

IP Address and Location Verification

The first time when a new device logs into InTouch you will be sent an email notification to your linked account giving you an approximate location and device information of the login.

This allows you to quickly identify anyone accessing your account.

InTouch Case Management Software