QATARFAX Confidentiality and Security
QatarFax provides a secure online fax service (FAX2EMAIL & EMAIL2FAX) with strong encryption and SSL access. Our encrypted fax service can encrypt incoming and outgoing faxes while they are stored on our servers, and encrypt fax confirmations saved on our servers. QATARFAX supports the most stringent regulations for data security and privacy.
- Incoming fax encryption
- Outgoing fax encryption
- Hidden destination number
- Encrypted fax confirmation
Our encrypted fax service can encrypt incoming faxes forwarded to you via email, via SSL or signed email. While this does not encrypt the transmission from your correspondent's fax machine to our fax servers, it does secure the contents of the message while in transit from our servers to your computer.
Outgoing Fax Encryption
QATARFAX can accept your outgoing fax documents via SSLor TLS-secured email-to-fax, so that the content of your outgoing mail is secure while in transit to your servers. For PKI, you initially obtain the QATARFAX public key signature (as a one-time action), after which you can encrypt your outbound messages.
Encrypted Fax Confirmations
You may choose to receive confirmations on fax delivery (for success, failure, or all transactions). Normally, these messages are sent in plain, unencrypted format. However, you can choose to receive these confirmation messages in encrypted format.
Additional Security Features
QATARFAX provides a range of additional security features, beyond encrypted fax receipt and transmission:
Hide destination fax number - add an extra layer of security by hiding the destination fax number from the fax header.
User authentication – QATARFAX enables you to enforce access roles by authenticating users and operators of the online fax system with usernames and passwords.
Automatic fax removal – all messages will be automatically deleted from our servers upon delivery. This ensures that no person, including QATRFAX staff, can view information contained in your faxes.
Physical security - all our servers are housed in secure environments, which can only be accessed by approved personnel.