Home About Us What SFR Does for You Data Security User Reviews Partnering Sign Up

Data Security

Your data is transferred over the Internet to our servers through an SSL-encrypted tunnel. This is the same technology used by banks to secure the online delivery of your banking information.

Every entry you make is encrypted using 256-bit AES encryption with a unique salt function for each SFR user and is stored on separate servers for backup. The US government uses 256-bit AES encryption for top secret information.

Your Secure Family Records account data is stored on dedicated servers (not shared servers or cloud servers) inside world class SAS 70 Type II certified data centers located in the U.S. All of our servers use RAID technology which writes your encrypted data simultaneously on multiple hard drives. All of our server administration is done in house in the US, and all of our servers are located in the US. We do not outsource any of our programming.

Our servers are configured so that you will always log into SecureFamilyRecords.com via a secure connection.

According to the browser you are using, you should also see a symbol (usually a small padlock) -- either on the bottom right of your screen, or at the end of the browser location bar. This indicates the secure connection is active. You can double click the symbol to verify that the web site identity is correct.

If you are using a newer version browser, the browser location bar will be shown in GREEN with an Extended Validation (EV) from GeoTrust, which is the highest level of authentication available among SSL certificates.

SecureFamilyRecords.com also employs security measures other than those discussed above to protect your information. These are explained in the HELP section for registered SFR Users.

Important facts for you to remember when you sign up for SFR:
We will NEVER ask you for your Login ID.
We will NEVER ask you for your password.
We will NEVER send you an email containing a link for you to log in to "update" or "verify" any of your information.
We CANNOT HELP YOU if you forget your password. It will be encryped and stored in your account. We will not have access to it, and we will not be able to retrieve it or reset it for you. It is YOUR responsibility to remember your password -- and not to share it with anyone you don't want to have access to your account.

The online security guidelines outlined below are not specific to Secure Family Records, but are important to follow if you want to protect your personal identification and family information.

Don't keep sensitive personal and family information on your computer.
If you copy sensitive personal data from your computer to a thumb drive, be sure to delete the data from your computer afterward, and be sure to store the thumb drive in a safe location. In a drawer, on your keychain, or in your briefcase or purse is not a safe location.
Too many people keep too much personal information on their computers.
Twelve MILLION Americans were victims of identity theft or fraud in 2011.

What information should not be on your computer?

- family member full names, addresses, and birthdates
- passwords and PINs for any accounts, including email accounts
- financial account information
- social security numbers
- copies of driver's license, passports, or visas
- copies of insurance, workplace, or school ID cards
- travel iteneraries
- inventory of household belongings
- copies of birth certificates and other personal documents

The FBI estimates that one out of every ten laptops purchased in the US will be stolen within the first year of ownership.

Don't be tempted to "share" quite so much on the social networking sites.
Everybody wants to have friends and wants to be LIKED and FOLLOWED. It makes them feel special, and who doesn't want to feel special?

HOWEVER ...there are people who troll the social networking sites to get information that they can use for bad purposes. It's not a good idea to broadcast everything you do.

Beware of "phishing". The strongest password will do you NO good if you give it away!

Phishing is an unscrupulous game that is becoming more successful every year. It is played on the Internet, on the telephone, and via fax, but the Internet is by far the most popular.

Phishing is one of the fastest growing Internet scams, and phishers are getting more sophisticated every day.
They design web sites that are almost identical to legitimate sites, and they often use graphics and links directly off of the legitimate sites, which makes it extremely difficult to determine the difference.

Phishing has become a very lucrative venture for phishers and is wreaking financial havoc for hundreds of thousands of Internet users. Everybody needs to be alert and constantly aware of the danger signs of phishing. It doesn't always happen to "other people".

What is the purpose of phishing? to trick you into giving out sensitive personal and financial data
How is this accomplished? by requesting your information via 'spoofed' emails or text messages
by setting up fraudulent websites that mimic ligitimate sites
by requesting information from you via telephone, mail, or fax
Why is phishing successful? because so many people continue to give out sensitive information

What can the thieves (phishers) do with the information they get from you?

• They can open new credit card accounts in your name, or buy items using your credit card information.
• They can get loans in your name.
• They can take money from your financial accounts.
• They can sell your information to other thieves who are even more inventive!

You can avoid falling victim to a phishing attack. The strongest password cannot protect you from yourself. Do not click on any links in an email requesting information from you and don't answer any personal questions over the telephone. You should NEVER divulge your password, account number, or PIN to anyone until you have verified who they are and why they need it.

Always go directly to the source to verify any requests for information.
Open a new browser window, go to the company web site address and log into your account from there, or call them on the telephone.

Don't be paranoid, but do be cautious. What are the signs that you might be the target of phishing?
You will probably get an email that appears to be from your bank, from your financial brokerage firm, from your insurance company, from an institution such as PayPal --- or from your email provider........... any entitiy that you would normally trust. The email will tell you that the company needs to "verify" or "update" your account information and it will contain a link for you to sign in with your Username and Password to update the information requested. The email might even state that if you don't comply with the request within a certain timeframe, your account will be put on hold or canceled! Scary? YES. True? NO!

Is it really a 'Phishing' scam? How can you verify that a request for information is legitimate -- or not?
Don't hesitate. Go directly to the legitimate source.

If you got the request for information via email, open a new browser window and type in the URL (Internet Address) of the entity who supposedly requested the information from you. Use the "Contact Us" link on the site and send them an email.

If you got the request for information via telephone, hang up and immediately call the company directly on the telephone. Tell them about the phone call you got and ask them if they requested information from you.

If the request came to you via email and is determined to be bogus, the company might ask you to forward the email to them so they can try to track the source. You will be doing yourself and others a big favor if you report incidences of suspected phishing (fraud).

Don't get 'Phishing' and 'Hacking' confused. They are not the same.
Hacking is when someone actually breaks into a system (database) and steals your information. This is MUCH more difficult than phishing -- and not nearly as common as phishing. The chances that any of your accounts will be 'hacked' is slim.

Phishing is when you play into the hands of an email, mail, or phone scam and give your information away voluntarily. Phishing is the most common way of getting your personal information, because it's easier! The chances of your being successfully 'phished' depends on YOU!

Take precautions and take some responsibility. These are just a few of the things YOU can do to help protect yourself and your family.

* Don't divulge any information until you verify that the request is from a legitimate source.
* Don't use the same username and password for all of your financial accounts.
* Don't share your password with anyone you don't want to have access to your account.
* Don't use the same password for email or social networking that you use for other accounts.
* Don't include your password when you email a company to report a problem or ask a question.
* Don't keep passwords in your desk drawer or stuck to your monitor -- at work OR at home.
* Don't use passwords that are easy to guess (names, birthdays, sequential series of numbers or letters, etc.,)
* Don't keep ANY sensitive personal or business information on your computer.
* Don't click on a link in an email to "log in" to any of your online accounts

Terms of Service | Privacy | Contact Us

Secure Family Records
© 1997 - 2017

Secure Family Records is a subsidiary of

Orios, LLC