Features

RightData’s eRooms redefine secure document sharing and management by combining industry-focused functionality with enhanced security...


Geo Tagging

Geo Tagging

Geo-tagging records the geographic coordinates (latitudes and longitudes) of users during logins or document interactions. Development from IP tracking tools, RightDatas virtual data room system integrates GPS data from the mobile devices and wi-fi triangulation for desktop users. The GPS tagging facility of RightDatas VDR helps to track the location of the users activity and provides a detailed audit of the data being accessed for security purposes.

  • The real-time alerts are provided from the login sessions of users for more enhanced security of the data in a data room.
  • Clients can permit specific regions, like the GPS locations of the corporate office or the place from which the data room can be accessed (preventing unauthorized activity in the data room, eg. a Mumbai or Chennai-based office address). The geo-tagging becomes an extra logging layer of security, preventing unauthorized access or editing rights.
  • Issues are traceable by alerting if the data has been compromised or accessed from unauthorized locations.
  • Blocks access to embargoed nations under OFAC regulations, providing export controls on the data.
  • RightData partners with threat intelligence platforms to detect VPN/IPs.
  • In jurisdictions where monitoring the location of the data room can pre-approve the actions based on the users travel routes to give them access to the data room.
  • These alerts and tools are being recommended to address specific pain points in data security and collaboration. RightData is one of the digitally recognized document collaboration tools like ISO 27001, and Digital Personal Data Protection (DPDPA), and the data security and regulatory compliance. Our virtual data platform offers robust solution for industries and businesses ranging from small-scale start-ups to large enterprises dealing in healthcare, M&A, finance, and real estate, etc.

Reader or Viewer Selfies

Viewer Selfies

A reader or viewer selfie captures a real-time facial image of the person accessing the session. This viewer selfie is mandated during the time of accessing the document via the provided link. Our VDR service platform displays a selfie screen, which prompts the user to access the data only after a selfie is captured. This feature has been enabled for an extra layer of security. Our VDR service prompts this screen if someone tries to log in from multiple browsers or unregistered devices during the session. This selfie feature stops the user from sharing credentials with anyone, thus ensuring sharing. It keeps the users selfies hashed and stored in the viewers login file as a reference and automatically deletes the images once the data room expires.

  • It prevents insider threats. A financial analyst once tried to share login credentials details with the competing party. But the system raised the alert for the viewer alert. The data room wasn’t accessed by the threat actor in that instance.
  • Forensic audit support is provided in the form the selfie logs are tied to a leaked document to a specific user session, which shows the identity of the person. The audit report clearly shows the selfies of the user who opened the file in a particular location, even with watermarked copy during the session.
  • The user’s selfie is hashed and stored as a unique non-reproducible encrypted client data.
  • Law and legal firms opt this feature to ensure only authorised partners view privileged client data.
  • The faces are pixelated or blurred to protect the viewer’s privacy using face-hiding technology.