safedrop standard
EU hosted with UK option, safedrop is trusted by many Local Authorities and law firms. Send and receive files and messages to anyone with an email address with high security, get any document signed with the eSignature add on. No account required for recipients.
Features
- No passwords!
- No plugins, No installs
- Send documents for eSignature with no preparation
- Prevent download with view only option for maximum security
- Full audit trails & read receipts
- GDPR compliant with custom terms of use
- Send & Receive large files up to 10GB
- self destruct and automatic expiry
- 24x7 support with 15 minute response
- ISO27001:2013 certified
Benefits
- Send & receive large files securely
- Easily share files with a secure link anywhere
- Free for recipients - no signup required
- Securely access anywhere in the world
- Send files securely to third parties
- 256 bit encryption in transit and at rest
- Revoke a safedrop if it's sent to the wrong person
- Complete control over user management
- No preparation required for eSignatures
- Securely capture information in PDF forms
Pricing
£2.33 to £7.33 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 3 3 4 6 7 9 1 6 0 2 0 6 3 3
Contact
OD Consultancy Ltd
Angus Bradley
Telephone: 0207 739 4252
Email: enquiries@projectfusion.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- PROJECTFUSION - virtual data rooms and workspaces.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No.
- System requirements
- Any web browser supporting TLS 1.2 onwards
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 15 minutes, 24 hours a day, 7 days a week.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is accessible directly from within the product and on the PROJECTFUSION website.
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
-
Users may contact our support team via telephone or email to support projectfusion.com for technical support. We will acknowledge the request by email within fifteen minutes of receipt. We will respond via email to the appropriate User and initiate addressing the request using reasonable endeavours within 4 Business Hours of initial contact. safedrop servers are automatically monitored every 3 minutes for up time. In the case of a critical failure, where the safedrop instance is not responding or accessible from any network, we will attempt to solve the problem using reasonable endeavours within 30 minutes of initial contact or notification by monitoring system.
Support is free, unless the client requires an onsite visit. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide online training videos in additional to providing users with documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can download their data directly from safedrop within the app. Only authorised users can download data. Data is deleted after expiry or after download.
- End-of-contract process
- At the end of the contract we remind the client a month in advance that their contract is due to end. At this point they can choose to extend, or to shut down the service. We then remind the client a week before shut down that their service will be deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The services are identical.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is accessed via a web browser, and allows users to use the platform. It's accessible without the need for any installations or plugins.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Users of assistive technology can use features built into their device including, but not limited to:
VoiceOver
Zoom
Magnifier
Speech: Speak Selection, Speak Screen, Highlight content, and Typing Feedback
Larger Text
Bold Text
Button Shapes
Increase Contrast
On/Off Labels - Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Users can upload and make changes to their files and file structure through the API provided they have relevant user permissions.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Logos and branding can be customised within the app
The login screen can be customised.
The customisation must be done by an admin user when the service is provisioned.
Terms of use can be customised.
Scaling
- Independence of resources
- Bandwidth throttling.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We can provide data usage reports on request. User reports are available at anytime within the app.
Full audit trail reports are available through a reporting module within the app. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
- AES-256 bit encrypted at rest
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be downloaded from within the app provided the data hasn't expired or self destructed after download.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Projectfusion will provide the Customer with at least ninety-nine.nineninepercent (99.99%) Uptime for each Projectfusion Instance during each Month during the continuance of this Agreement. The Company shall remedy any breach of the warranty set out above by the provision of a credit against fees payable by the Customer for the Projectfusion Instance for the next following calendar month. Such credit will be equal to a percentage of the monthly Basic Price (not including additional surcharges, separate support fees, or any other additional fees charged to the Customer on account of additional services, if any) allocated to the particular Projectfusion Instance.The percentage credit is calculated as per the following formula:
Percentage of time in month for which service is available Credit percentage
99.9% or more None
98% TO 99.9% 20%
Below 98% 40% - Approach to resilience
- Available on request.
- Outage reporting
- We receive an alert from our monitoring system, we would then alert our clients key contacts by email/telephone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Assured by independent validation of assertion.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CFA
- ISO/IEC 27001 accreditation date
- 19/01/2018
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 - our policies are documented within our ISMS procedure and all staff sign a document to show the adhere to the policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Formal policies and procedures established which covers changes to all software, applications, systems, infrastructure, hypervisors, virtual machine images, databases, services, operations & facilities used
All configuration controlled using Puppet. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Security sites and blogs checked daily manually for important updates.
Fortnightly automated check of services against vulnerabilities.
Monthly NESSUS scans.
‘Critical’ patches deployed same day
‘Important’ patches deployed within 1 week
‘Other’ patches deployed within 4 weeks of a patch becoming available
‘Critical’, ‘Important’ and ‘Other’ are aligned to the following common vulnerability scoring systems:
National Vulnerability Database Vulnerability Severity ratings: ‘High’, ‘Medium’ and ‘Low’ respectively. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
OSSEC installed on all servers.
All log files stored in tamperproof cloud storage, and subjected to manual & automated checks. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Formal incident response plan.
All users and personnel reports incidents via trouble ticket.
All reported Information Security weaknesses, observations and occurrences are, immediately upon receipt, assessed and categorised. Reports are raised in the ISMS board. A record is made of the assessment.
The Information Security Manager (or other investigator) investigates the circumstances, and categorises the reported occurrence or observation into one of four categories: okay, event, incident or unknown.
Once incident contained, and required remedial action completed, the Information Security Manager prepares a report for the Management Review & Clients.
Incident reports to any affected clients within 72 hours.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We donate at least 1% of our turnover to 1% for the planet, supporting charities that work towards sustainability, nature conservation and more - all in an effort to bring awareness to and help prevent the devastation being caused to the planet. Our data centres are committing to zero waste to landfill, and resorting to renewable or low carbon energies by 2025.
Pricing
- Price
- £2.33 to £7.33 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
2 week free trial
Doesn't include API access
No branding options