We understand that your IT department may want to perform due diligence on all third party technology providers. To make life easier for everyone, we have assembled the most common and relevant questions and answers here.
The following domain names can be used to access the application: courtformpro.com
You may receive email from addresses at the following domain names, and should ensure they are allowed in your email spam filter: @courtformpro.com
Yes
Yes
Yes
Cloud
Software as a Service (SaaS)
Public cloud (eg, AWS, Azure, Google Cloud, etc)
Yes
DigitalOcean
Sydney, Australia
Multi-tenant
99.99% uptime per month
Yes
No removable media is used
Data is backed up on a daily basis, and retained for 7 days
We aim to restore access as quickly as reasonably possible.
Yes – see https://courtformpro.com/legals
Yes
Yes
Yes
We notify affected individuals and the OAIC about an eligible data breach. An eligible data breach occurs when: 1. there is unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information, that our organisation holds 2. this is likely to result in serious harm to one or more individuals, and 3. our organisation hasn’t been able to prevent the likely risk of serious harm with remedial action. Notification must be made promptly, and in any event within 7 business days of discovery of the eligible data breach.
Yes
Yes
Yes. Among other things, we log the IP address and logged in user ID for the following actions: - Log in (and all steps in the log in flow) - Log out - Access a form - Alter a form - Create a new form - Invite other users to gain access to a form
Yes. Internally, the software keeps track of users and memberships. Users can only access products to which they have a membership. Externally, logins are handled by email address. Accordingly, as soon as a former employee has their email access removed, they lose access to the app.
Email address and password, with 2-factor authentication handled by temporary one time passwords sent by email.
We do not currently offer this. However, because our user authentication uses 2-factor authentication via email, if a staff member leaves your firm and loses access to their work email, they will also lose access to their account on Court Form Pro
Yes – temporary one time passwords are sent to the user's email address on every login.
No. However, we maintain an information security capability commensurate with information security vulnerabilities and threats by taking the following precautions, among others: 1. We produce a minimal product, with minimal features, and therefore, minimal surface area exposed to the outside world. 2. We use extensive automated testing to ensure our software is and remains secure against malicious users attempting to access data they should have access to. 3. We leverage widely-adopted technologies with active security maintenance. 4. We use tightly constrained network architecture which only opens the ports and hostnames that are essential for continued operation. 5. We apply sweeping IP restrictions to production assets such that they are only accessible to other production assets, and to approved company workstations.
Yes. Wherever possible we use managed infrastructure where these patches are applied automatically for us.
Yes. We use XProtect to scan executables when they run, when they change, and when new signatures are made available. We also benefit from automatic MRT, SIP, Bastion, and XProtect Behavioural Analysis.
Yes
At least weekly
At least weekly
Among other things, suspicious activity is logged to an audit trail database and redundancy log store, and alerts are emailed to the technical team. Unexpected resource usage levels are emailed to the technical team.
No
Yes
All new employees or contractors undergo background checks and identity verification
Yes
Yes
Yes