Security

Advanced security for your mail

Your physical mail and online data are secured through layers of protection that involve mail processing centers, access control, monitoring, data transfer and storage.

mobile-security
virtual-mailbox-icon

On-site mail processing

Every VPM location receives, processes, and stores mail on-site. Because there are no extra transits to a central processing facility, the risk of your mail being delayed, lost, or damaged during transfer is significantly reduced. Plus, get your mail up to 2 weeks sooner.

shredding-icon

On-premise document shredding

All of your unwanted mail is shredded on-site using mobile shredding services. Your mail leaves the facility in millions of pieces to prevent your personal information from landing in the wrong hands. Document destruction certificates are available upon request.

virtual-mailbox-icon

HIPAA compliance

VPM adheres to HIPAA standards to protect sensitive patient health information from being disclosed without the patient's knowledge or consent. VPM will also sign a BAA to satisfy HIPAA requirements.

online-data-protection-icon

Online mail data protection

Your mail data is hosted only on Amazon Web Services’ (AWS) SOC2 and HIPAA compliant infrastructure. It is encrypted when stored at rest and stored with 99.99% durability over a given year to reduce data loss. We protect your data as outlined in our DPA.

address-icon

Keep mail private

Occasionally you may receive sensitive mail that is for your eyes only. In this situation, you can request that your mail not be opened or scanned, and instead, have it shipped to directly to you. You decide the best way to handle your mail.

SSL-icon

SSL encryption for data in motion

All transfers involving your mail data are encrypted with high level SSL encryption, which blocks unauthorized users from intercepting information in flight.

password-icon

Hashed passwords

No one, not even VPM, will know your password. This is because it’s not stored in cleartext, but hashed and stored using SHA-256 and higher algorithms.

two-factor-authorization-icon

Two-factor authentication (2FA)

This extra layer of authentication strengthens security access to your account and data. In addition to your standard password, 2FA requires you to enter a one-time passcode to gain access to your account. This is done using an authenticator app that’s installed on your phone.

third-party-data-protection-icon

Third party data use

Under VPM’s privacy policy, your personal information is not shared with unauthorized third parties. Your data is not sold, rented, or provided to outside parties and your information is only used with third party partners (CRM, AWS, and email systems) to provide the services VPM offers.

security-bug-icon

Risk mitigation and audits

VPM performs periodic security audits to mitigate risks and vulnerabilities in the system. VPM is also proactive in finding and fixing potential weaknesses within the organization's network and data infrastructure.

encryption-icon

Bank level encryption for billing

Your payment data is encrypted and stored in PCI Compliant systems ensuring no one gains access to your credit card information.

surveillance-icon

Top grade surveillance

Sleep well knowing that every VPM location has high resolution security cameras, alarms, and door access control systems to guard your mail from unwanted visitors. All mail processing is monitored for additional safety.