Frequently Asked Questions
What is Trusted Family 2.0?
The Trusted Family name is more than just a label; it’s a reflection of our unwavering commitment to family businesses and offices. Grounded in 15 years of knowledge and expertise, the team at Trusted Family designed a new version of the platform, now called 2.0, to level up the governance game. Today, Trusted Family 2.0 is the only governance software that creates successful family stakeholder relationships, at scale. It offers a fully integrated platform that combines document storage and sharing, customizable collaboration tools, granular access controls, and advanced security measures to facilitate transparent communication, decision-making, and accountability within complex stakeholder ecosystems. .
Is it suitable for us?
It is suitable for any organisation of any size, across any industry but – with complex stakeholder needs. It offers a tailored solution to handle the challenges of complex stakeholder relationships, privacy, and security while providing real-time communication and collaboration capabilities. Our custom governance solution brings laser-sharp focus and accelerated decision-making across any enterprise, but specifically for the family-owned and family-run. In comparison to generic collaboration solutions that cater to a broader range of organizations, we prioritize stakeholder governance and the management of sensitive information.
What are ‘Spaces’?
Spaces serve as secure, organized environments for users to collaborate, schedule meetings and share content with selected participants. Each Space consists of modules, such as Announcements/Activity Feed, Events, Files, and Profiles, with the potential for additional modules to suit your business needs. This feature allows you to organize and control access to relevant information, ensuring that only the users with the appropriate permissions can view and interact with the content inside of those Spaces.
What are ‘Vaults’ and how do they facilitate document management?
Vaults are designed to provide convenience and security for your sensitive files. They are used to store, organize, and share important documents within your organization, while ensuring controlled access. A vault manager can upload documents to Personal Vaults, create Shared Vaults with controlled access, and track changes and events through Audit Logs. This feature streamlines document management and safeguards the confidentiality and integrity of your files.
Can we customize the platform to match our organization’s branding?
Yes, it is highly customizable, allowing your organization to add its logo and brand colors. This feature ensures that the platform aligns with your organization’s identity and provides a consistent experience for all your users.
How do you protect our sensitive files and information?
We’ve implemented protective tools to maintain the integrity of your documents, including measures against unauthorized downloads, while offering capabilities for document watermarking to help safeguard your sensitive information. Watermarking adds a visible identifier to your documents, which can deter unauthorized sharing and trace the source of any leaks. Additionally, the platform offers an in-house digital signature solution to guarantee the authenticity and integrity of your documents.
Is your in-house digital signature solution as secure and legally-binding as other industry standard tools?
The short answer: Yes!
The long answer:
- Data ownership and control: With our custom solution, we have complete control over the data and can guarantee that all sensitive information is stored in the same secure and compliant manner as the rest of the data and files in our customer’s system. There is no need for the files to be sent to a third-party provider and returned back to our platform.
- 100% customized for our clients’ needs: By building a custom solution, we can provide a consistent and seamless user experience that is tailored to our customers’ specific needs, rather than having to conform to the limitations of a third-party solution. For example, other e-Signature solutions have limitations in terms of number of signers or are unable to recognize partially signed documents as concluded.
- Guaranteed on-par if not better solution: Our custom eSignature solution is designed to meet, if not exceed, the security standards set by leading providers. To instill further confidence in the authenticity and security of each signature, we leverage digital certificates, which affirm that the signed documents originate from a recognized source and have not been forged or tampered with.
How do you ensure the security and privacy of our confidential data?
Our product philosophy prioritizes the security and privacy of your data. Our platform, available on both web and mobile, has been designed with advanced security features. We work with infrastructure providers and implement strict access controls and encryption to ensure your data is protected from unauthorized access.
We follow a disciplined approach to security, including regular independent security audits and continuous improvement of our security posture. Our business model guarantees 100% data ownership for you, and we never monetize your data. Our platform strikes the perfect balance between security and usability, providing a secure environment for your organization’s communication, sensitive information, workflows, events, and meetings.
Where is our data stored?
Your data is stored with the best-in-class infrastructure providers. To ensure business continuity and disaster recovery, we take daily backups using redundant tooling and distribute them geophysically.
What kind of login/authentication do you provide?
Our platform supports a variety of secure login and authentication methods, including Single Sign-On (SSO), passwordless sign-in, and 2-Factor Authentication (2FA) for enhanced security.
What is Two-factor Authentication?
2-Factor Authentication (2FA) is an added layer of security for your account that requires two distinct forms of verification during the login process. This helps ensure that only authorized users can access your account, even if someone else obtains your password. In the product, 2FA can be enabled through an authenticator app, which generates a unique one-time code, or via SMS, where a code is sent to your registered mobile phone number. By providing this additional level of protection, the platform aims to keep your account and sensitive information safe and secure.
What is a passwordless sign-in and is it secure?
Passwordless sign-in is a secure and user-friendly authentication method that eliminates the need for traditional passwords. Instead of relying on a password, users receive a unique, one-time-use code sent to their verified email address. By entering the code or clicking the link, users can securely access their accounts. This approach reduces the risk of password-related security breaches, such as weak passwords or password reuse, and simplifies the login process for users. The security of passwordless login is as robust as the security of one’s access to their email account, ensuring a high level of protection when used with a secure email provider and strong account security measures.
Have more security and privacy questions?
How do I sign up?
Getting started on our platform couldn’t be easier. Talk to our team today.
What are your customer service hours?
We have a dedicated relationship and client success team that’s distributed across multiple timezones to help you with your questions before and after signing up for the platform.