Enter your personal and business contacts onto CloudSafe, free of charge, and, if desired, assign them access to your safes. You can revoke your consent to their access at any time - this means you have complete control over your data.
CloudSafe offers you unique access possibilities, which are not available anywhere else:
A contact can only access a safe if another designated contact approves access. The person making the approval does not have any access themselves. Therefore this person can also be an external mediator such as a lawyer or notary.
A contact can only access a safe if a designated second contact approves access. This rule applies equally to both contacts. In this way you can ensure that there is always a second "pair of eyes" monitoring access.
Naturally you can also grant direct access to your data to people or groups on your contact list. In this way you can collaboratively share and edit documents with several people at the same time.
You can invite as many people as you choose, free of charge, to your contact list and sort them into groups. Once confirmed, you can grant the person or the group individual access to your safe – or keep it for yourself. You are now free to carry out encrypted data exchange. For this we use a highly secure public/private key encryption: furthermore the data cannot be decrypted and viewed by external parties or by CloudSafe.
Use personal access codes for access to your safes. You can note these and store them securely either for yourself or for others. For example, on a card for emergencies, in your will or with approval by telephone, they are secure and convenient.
An access code is more secure than a password! It is not stored at CloudSafe, but rather, when entered, serves as a decryption identifier. This also means that nobody can access your data without the right access code, not even CloudSafe.