Data Protection Measures
Multiple layers of security to keep your family's information safe and private.
Your family PIN is never stored in plain text. It's hashed and salted using industry-standard cryptographic methods (bcrypt algorithm) making it virtually impossible to reverse-engineer.
When managing your family vault, we require additional verification through security questions based on family relationships. Even if someone obtains your PIN, they cannot make changes without knowing personal information about your family.
All data is encrypted both in transit (using TLS 1.3) and at rest (using AES-256 encryption). Your information is protected whether being sent between your device and our servers or stored in our databases.
We utilize enterprise-grade infrastructure with AWS-level security measures including DDoS protection, intrusion detection, automated threat monitoring, and regular security audits.
What We Store
We only store the minimum information necessary to provide our service.
Stored Information
- Family PIN: Hashed and salted, never stored in plain text
- Member Names: First names of family members
- Phone Numbers: For emergency contact purposes
- Email Addresses: Optional field for additional contact
- Relationships: How each member is related (Father, Mother, etc.)
- Visibility Settings: Whether each member appears in emergency results
Security Best Practices
Follow these recommendations to maximize the security of your family vault.
PIN Management
- Choose a unique PIN not associated with birthdays
- Change your PIN periodically for added security
- Only share your PIN with trusted family members
- Never write down your PIN in accessible places
Device Security
- Use device passcodes or biometric authentication
- Keep devices updated with security patches
- Be cautious on shared or public devices
- Use private browsing on devices you don't own
Maintenance
- Regularly review your family member list
- Update contact info when details change
- Remove members who no longer need access
- Create new vault if you suspect unauthorized access
Security Vulnerability Reporting
Found a Security Issue?
If you discover a security vulnerability in Kintact, we encourage you to report it immediately. We respond to all legitimate reports within 72 hours and work diligently to patch verified issues.
kintact@zohomailcloud.caPlease Include
- Steps to reproduce the issue
- Screenshots or videos demonstrating the vulnerability
- Any relevant error messages or logs
- Your suggested remediation (if available)
Security Update History
Our commitment to continuous security improvement.
- Implemented PIN hashing with bcrypt algorithm
- Added multi-layer authentication for management functions
- Enabled end-to-end encryption for all data transmissions
- Implemented visibility controls for emergency contacts