At Insight Notes, we recognize that security is of critical importance for therapists and evaluators. That's why we've designed Insight Notes from the ground up to take advantage of encryption technology.
The notes you take with Insight Notes are yours, and yours alone. No one, not even the Insight Notes Team, has access to your notes.
- All of your notes data, including file names and associated dates, are heavily encrypted. We currently use the AES 256-bit encryption algorithm, which is strong enough to be certified for use by the US government for top secret information. Insight Notes has also been issued an encryption registration number and commodity classification code from the United States Bureau of Industry and Security.
- The notes you take with Insight Notes are self-contained and not accessible to other programs on your iPad. The notes remain encrypted at all times, except when the app is active and running on your iPad.
- Users who subscribe to the Insight Notes backup service have their notes backed up to a secure server with strict access controls. In addition, your Insight Notes backup files remain encrypted on the backup server, so even if there is unauthorized access to the server your files remain encrypted and unreadable without your personal encryption code.
- Because your Insight Notes data are encrypted within your iPad and unaccessible without your encryption code, this means that other people who have access to your iPad do not have access to your notes. Your notes remain encrypted even if your iPad is lost or stolen.
- Insight Notes requires the use of an "encryption code," which is different than a password. Most recordkeeping systems use passwords, which users provide and are then cross-checked against a stored list to gain authorized access to data. In contrast, Insight Notes requires users to select their own "encryption code," which is essentially a personal encryption key. Insight Notes does not store a record of your encryption code, nor does the Insight Notes team have access to your encryption code. The upshot of this method is that you alone have access to your encryption key. The potential downsides are that (1) if you lose your encryption code no one can access your notes, and (2) once selected, your encryption code cannot be changed. Bottom line: guard your encryption code very carefully.