top of page
Blue Smoke
TrustSafe logo

TrustSafe Point

Secure Document Management & Sharing System

To Know More

Highlighted function and features

  • Encrypt the documents with PKI algorithm

      Strong encryption applied, AES 256 and RSA 2048.

  • Securely share the files with flexible Digital Right Management
    Share files with external parties in a secure and controllable scenario while we can pre-set the time limitation, watermark, as long as prevent document editing, printing, and downloading. 

  • User authentication
    The confidential documents are being encrypted by correspondent authorized user's electronic certificate, which can prevent information from being read by unauthorized individuals. 

  • Access management 

      Define who can access the documents and their access levels. 

​​

  • Short-time implementation 
    A web application to add, update, view and share confidential documents.

     

  • Tailor-made workflow with announce function
    User can easily set up multiple document sharing workflows for different situations. 

     

  • Versioning 
    Keep copies of documents created overtime. Provide recover function of deleted items for system administrator. 

  • Audit log
    Keep track of all users’ activities

Use case

Data privacy rights play a key role in the whistleblowing procedures. Organizations need to be careful in handling personal data and report status in every single process. 

An all-rounded, secure communication environment, that prevents information from being read by unauthorized individuals, is essential for sharing sensitive information like whistleblowing. 

TS Point use case
  1. Whistleblower made a Protected Disclosure via the system with the reports and supporting documents. 

  2. Internal Audit & Risk Management team, who will be the Investigation Team, will receive and review the report. 

  3. The report can be partly shared with the internal Legal Team or external lawyers for 2nd opinion while investigating. External lawyers will be distributed the protected and access-controllable reports, which are only allowed to be reviewed and made comments. 

  4. If the report is needed to proceed, the results of the investigation will be escalated to the President Director. 

  5. Management makes the decision on the violation report. 

  6. Reports of the company violation are submitted to the Audit Committee.

3
2
1

Feel Interest in our 

Secure Solution?

Contact Us for More

Details & Information

More Products & Solutions 

About our firm

About Our Firm

Trusted System 

Company background and information

More auxiliary tools

More Auxiliary Tools

Enigmator

Manage your Tokens & e-Certs securely. 

Other management

Other Management 

ECAP

Help your firm to run smoothly and breezily.

Trusted Systems logo
Trusted Systems Logo
bottom of page