The security measures we've put in place were designed with one goal: protecting your family's most important information.
Data at Rest
We use Advanced Encryption Standard (AES) 256-bit encryption. All stored data is encrypted to the highest standard, the same as that used by all US financial institutions.
Data in Motion
Your connection to us is always secure. We use Transport Layer Security (TLS) 1.2/1.3 to protect every interaction from logging in to uploading documents. You'll see "https" in your browser, confirming your connection is encrypted.
Database Security
We use Supabase's enterprise PostgreSQL database with Row Level Security, which means you can only see your information, no one else's. Every database record is encrypted, automatically backed up, and protected by multiple security layers. Learn more about Superbase's standards and SOC 2 compliance.
Data stored in the Cloud
We leverage Amazon Web Services (AWS) components to provide reliable fault-tolerant and highly available systems in the cloud. AWS security standards.
Your information
We appreciate that you have entrusted us to store and safeguard your personal information. We will never share, sell, or transfer any information about you, or any data that you store using our services without your consent or as outlined in our privacy policy. Visit our Privacy Policy to learn more.
Data deletion
Your account belongs to you. If you decide to close your account, you have 90 days to download everything. After that, we permanently delete all your information: vault contents, uploaded documents, emergency contacts, everything. Our backup systems complete the final deletion within 35 days.
Passwords
We make unauthorized access extremely difficult. YoWe require passwords that meet security standards and recommend creating one with 14 characters or more. Your password is encrypted and protected—we never store it in a readable format, and we can't see what it is. To keep unauthorized users out, we automatically log you out after you've been inactive for a while.
Emergency access
You decide who sees what. When you designate emergency contacts, you choose exactly which vaults they can access. They can view information, but can't change anything. You can modify or revoke their access at any time.
In the event of a system outage, we have processes in place to help keep all data safe and secure. We also have disaster recovery and business continuity plans in place. If you are aware of a security issue affecting Next of Kin Plan or our members and you wish to disclose it, email us at security{@}nextofkinplan.com. Likewise, if you have any other security concern, please let us know.
Copyright © 2024 -2025 Next of Kin Plan. All Rights Reserved.