How secure is Alaska ZendTo?

All files are transferred across the network securely encrypted.

If you are sending personal or confidential data, tick "Encrypt every file" when creating a new drop-off. Then the passphrase you enter must be used when downloading the drop-off. The passphrase is not stored on Alaska ZendTo, and cannot be recovered if lost. No one can access the files without it.

All files uploaded and temporarily stored on Alaska ZendTo are held on equipment owned and operated at The State's own Data Centre.

All data is subject to the Data Protection regulations and laws of The State and the country.

Alaska ZendTo is in no way a "cloud" service. Everything is stored (even temporarily) on equipment directly owned by The State, and managed by its own IT staff.

All access to data is very tightly and strictly controlled by The State. All accesses to data on Alaska ZendTo are logged and can be easily checked if you are ever concerned that a 3rd party might have gained access to your data.

Furthermore, uploaded data is only held on Alaska ZendTo for a maximum of 7 days, after which time it is automatically deleted. There is no "undelete" facility available at all. No backups are taken of the uploaded data (it's only a transitory stopping point), so no uploaded data ever moves off Alaska ZendTo itself onto other equipment or media such as backup tapes. After an uploaded file has been deleted, there is no way of recovering the file.

Retrieval of a drop-off by a recipient can only be done with both the drop-off's Claim ID and Passcode.
When dropping off files, you can choose not to send either or both of these to the recipient automatically: you would then need to send that information by hand yourself. By extension, anyone with whom you have shared these values may share them with someone else. Ultimately, the responsibilty for maintaining confidentiality of important information lies with the originator. To be sure your information remains secure you may encrypt it before dopping it off for someone to collect. Suggested methods include:
  • WinZip - file packager with encryption
  • 7-Zip - file packager with encryption
  • GPG - GNU Privacy Guard encryption tool
  • PGP - Symantec Pretty Good Privacy encryption tool