Pepicon is designed to provide a secure environment for companies to store their data as well as secure robust ways to share their data with their invited investors.

This is done with four different mechanisms:

  1. Secure Data Transfer
  2. Secure Data Storage
  3. Fine-grained Role-based Access Control
  4. Detailed Audit Logging
  1.     Secure Data Transfers to and from Pepicon

All data transfers between the Pepicon platform and the end user is encrypted using SSL (Secure Sockets Layer), a standard security technology for establishing an encrypted link between a server and a client. SSL uses a combination of asymmetric and symmetric keys and how they work together to create an SSL-encrypted connection, making the connection virtually impossible to crack.

  1.     Secure Data Storage for Data at Rest

Data in the Pepicon system is always stored encrypted using one of the strongest block ciphers available, the 256-bit Advanced Encryption Standard (AES-256). This ensures that only authorized users are allowed access to the data.

  1.     Fine-grained Role-based Access Control

Pepicon is built from the ground up with fine-grained role-based access control. This means that individual information items in the memorandum can be access controlled in ways so that different roles can or cannot access specific information items. This gives the company administrator full control over what to share with whom in a controlled, secure and scalable manner.

  1.     Audit Logging

Pepicon logs all information access requests, whether it is to create, read, update, or delete information items. Pepicon logs what was accessed, when it was accessed, how it was accessed and by whom it was accessed. This audit logging functionality powerfully enables company administrators to track and trace who accessed what information when and how.