Terminology

Understanding key terms is essential for maximizing the benefits of LEEP. Here’s a brief guide to some of the important terminology used in our platform:

AES-256 Bit Encryption

A secure encryption standard widely used to protect sensitive data. It employs a 256-bit key length, making it extremely difficult for unauthorized parties to decrypt the information.

No-Knowledge Access

A security model where the service provider (LEEP) cannot access or view the user’s data. Only the user possesses the encryption keys, ensuring complete confidentiality.

End-to-End Encryption

A method of data transmission where only the sender and the intended recipient can access the information. This protects data from interception during transfer.

Self-Destructing Files

A feature that allows users to set expiration dates or timers for shared files. Once the time limit is reached, the files are automatically deleted, reducing the risk of unauthorized access.

Granular Access Controls

Fine-tuned permission settings that allow users to define who can view, edit, or share files. This ensures that only authorized personnel have access to sensitive information.

Audit Trail

A comprehensive log of all file activities, including uploads, downloads, and access attempts. This feature supports accountability and helps maintain the integrity of data handling.

Chain of Custody

The process of maintaining and documenting the handling of evidence from the point of collection to its presentation in court. LEEP’s audit trail supports compliance with chain of custody requirements.

Zero-Trust Model

A security framework that assumes threats could be internal or external. It requires strict identity verification for every person and device trying to access resources on a network.

Compliance

Adherence to laws, regulations, and standards governing data security and privacy, such as CJIS, HIPAA, and GDPR. Compliance ensures that sensitive information is handled correctly and securely.

Confidentiality, Integrity, Availability (CIA Triad)

The three core principles of information security. Confidentiality protects data from unauthorized access, integrity ensures data accuracy and consistency, and availability guarantees that authorized users can access data when needed.

Confidentiality, Integrity, Availability (CIA Triad)

The three core principles of information security. Confidentiality protects data from unauthorized access, integrity ensures data accuracy and consistency, and availability guarantees that authorized users can access data when needed.