What is DigiCoffer For Businesses ?
DigiCoffer enables Businesses to establish digital relationship with customers, interact with them digitally and comply with privacy regulations through well documented audit trails.

Temporary access to customer credentials with customer consent is available to the businesses while establishing the relationship with the customer. DigiCoffer also provides features to manage KYC (Know Your Customer) for B2B and B2C customers

DigiCoffer functionalities could be used for efficient digital interaction with customers in accordance with terms & conditions for marketing as well as for regulatory compliance. The DigiCoffer platform is secured with information security best practices.
Information and Digitized Credentials
Businesses can store their business information such as name of the Business location, and key contacts. This information is available for B2B customers

Digitized credential documents like company registration can be verified by appropriate authoritative sources and stored securely in DigiCoffer
Customer Relationship Life Cycle
Customers can share their credentials and other personal information required to establish the relationship with businesses temporarily.

Verified customer credentials helps the businesses to know their customers (KYC) with certain level of confidence

Businesses can ensure and show the compliance of privacy regulations throughout the relationship life cycle
Terms & Conditions Management
Terms & Conditions functionality helps businesses to manage versions of terms and conditions. It helps in managing the acceptance of terms and conditions by the customers.

Audit trails of acceptance of terms and conditions are visible to the business and their customers
Marketing
Businesses can comply with terms & conditions while sharing the privacy information of their customers with partners and email marketing providers.

DigiCoffer can ensure that only minimum contact information of customers opted in to the terms and conditions is made available to the partners
Watch Video
x
Online Safety & Security for Everyone

Information, Tips and Tools

Brought to You by DigiCoffer


Online safety and security require us at a minimum to learn and act on Access Protection, Data Protection and Device Protection best practices
    1. Access Protection:
    In order to get access to a secure application we need prove our identity through passwords, biometrics, tokens or other methods. This process is called authentication. Highly secure applications require more than one type of authentication, generally called multi-factor authentication.
  • Password
  • Passwords are widely used for authentication. There are many password best practices available to prevent bad actors from getting un-authorized access to our applications.

    Password Manager tools make it easy for everyone to apply password best practices for creating and managing strong passwords. DigiCoffer recommends open source password manager Keepass. You can download and use Keepass instructions created by DigiCoffer.
  • Biometrics:
  • Biometrics (finger prints, iris recognition, facial recognition) is used a method of authentication finger print scanner of a smart phone is a good example
    2. Data Protection:
    Personally identifiable as well as confidential data and documents need to be protected when it is stored, viewed on a device and when it is traveling through the networks. Further it is essential for individuals to have control over their data. Generally, many businesses are required to comply with privacy regulations across the globe. Encryption, hashing and masking are the common data protection methods.
    Through Masking the data on a device screen is masked by special characters like asterisks (***) or dots (….).
    Hashing and encryption use hash functions and encryption algorithms to convert readable text into an unreadable output. It is impossible to turn hash back to the original text. But encrypted text can be converted to original text using key (s), this process is called decryption.
    3. Personal Device Protection:
    Protecting personal devices from viruses, malware and other security threats is very important. This can be accomplished by installing commercially available security software. Keeping the security software up to date is essential to get protection from latest security threats.