Heres The Evidence .Com: Customers of Evidence.com have different risk profiles and various security criteria. Many of the access control functionality may be allowed, deactivated, or modified to meet a particular level of risk by customers if appropriate.
These security features have been selected to provide a high degree of security with a high degree of versatility and convenience. These features are welcomed and aligned to consumers with their individual needs.
Evidence.com provides software to ensure digital evidence is integral and genuine. These features ensure that the evidence meets the criteria for a chain of custody and can be genuine and untouched.
Every file with the industry-standard hash functions forensically fingerprints. Integrity is validated in order to ensure that no modifications occur during transmission before and after download.
Complete flawless audit records of facts. Logs were who, and for every file of evidence. Even by account administrators these documents cannot be updated or modified. In the case of derivative works (video segments), original proof files are never changed.
Security for deletion, including workflows for deletion acceptance, deletion email alerts and elimination of remorse time to unintentionally retrieve deleted proof files.
Please email [email protected] with an in-depth description of the problem or vulnerability if you know or suspect security issues on an Evidence.com account or if you think you found security problems on Evidence.com or an Axon product. All confidential test results or information should be transmitted through an encrypted channel to Axon.