What is DigiCoffer Professional ?
Professionals can share the digital client documents like tax returns, wills etc. through DigiCoffer in a safe and secure manner. In addition the professionals can access the digitized client credentials stored by the clients in DigiCoffer for Individuals or DigiCoffer for Businesses.

Professionals can use the document management capability to manage the final versions of the documents produced by their professional practice while increasing their productivity through digitized interactions with their clientsnotifications and reminders functionalities enable efficient digital interaction with clients. The DigiCoffer platform is secured with information security best practices.
Information and Digitized Credentials
Professionals can store their practice information such as name of the practice location, contact information, members of the practice etc.

Digitized credential documents like company registration, professional credentials etc. can be verified by appropriate authoritative sources and stored securely in DigiCoffer
Document Sharing with Clients
Professionals will be able to store the final versions of client documents digitally and share them with their clients.

Clients can also share their credential and selective personal documents digitally

Audit trails capture the access and download activities
Document Management
Document management functionality helps professionals to store client documents as well as other practice related documents with metadata tags.

User friendly interface allows professionals to search the document store using multiple search criterion
Reminders and Notifications
Combination of system generated and manually configured reminders generate notifications for actions for both practice team members and the clients

Reminders and notifications make the digital interactions with clients efficient, secure and collaborative
Watch Video
Online Safety & Security for Everyone

Information, Tips and Tools

Brought to You by DigiCoffer

Online safety and security require us at a minimum to learn and act on Access Protection, Data Protection and Device Protection best practices
    1. Access Protection:
    In order to get access to a secure application we need prove our identity through passwords, biometrics, tokens or other methods. This process is called authentication. Highly secure applications require more than one type of authentication, generally called multi-factor authentication.
  • Password
  • Passwords are widely used for authentication. There are many password best practices available to prevent bad actors from getting un-authorized access to our applications.

    Password Manager tools make it easy for everyone to apply password best practices for creating and managing strong passwords. DigiCoffer recommends open source password manager Keepass. You can download and use Keepass instructions created by DigiCoffer.
  • Biometrics:
  • Biometrics (finger prints, iris recognition, facial recognition) is used a method of authentication finger print scanner of a smart phone is a good example
    2. Data Protection:
    Personally identifiable as well as confidential data and documents need to be protected when it is stored, viewed on a device and when it is traveling through the networks. Further it is essential for individuals to have control over their data. Generally, many businesses are required to comply with privacy regulations across the globe. Encryption, hashing and masking are the common data protection methods.
    Through Masking the data on a device screen is masked by special characters like asterisks (***) or dots (….).
    Hashing and encryption use hash functions and encryption algorithms to convert readable text into an unreadable output. It is impossible to turn hash back to the original text. But encrypted text can be converted to original text using key (s), this process is called decryption.
    3. Personal Device Protection:
    Protecting personal devices from viruses, malware and other security threats is very important. This can be accomplished by installing commercially available security software. Keeping the security software up to date is essential to get protection from latest security threats.