We realize that you are trusting the NextLifeBook service with the important information and precious memory.
Your information is encrypted and protected with industry-leading technology and security.

Securing Your Data at Rest

Within our systems, all your data is stored using Advanced Encryption Standard (AES-256 encryption), AES has been adopted by the U.S. government and is now used worldwide.

As with all systems such as ours, the security of your information depends on you. We always advise our user to choose a strong password (we enforce that as best we can) and never share it with anyone.

Securing Your Data in Transit

All communications between you and NextLifeBook are encrypted via SSL and we require SSL on all communications. We support perfect forward secrecy so that even if someone eavesdrops on your communication, they will still not be able to decrypt the data in the event that our key is compromised.

Two Factor Authentication

Security is not just about protecting your data, it is also about protecting access to your account. By enabling Two Factor Authentication using Google Authenticator, whenever you sign into your NextLifeBook from a new computer, device, or browser, you will need to generate a unique code from your phone's Google Authenticator app that you must input as part of your login.

This extra layer of security makes sure that even if a bad guy steals your password from you (or from a site that’s less secure than NextLifeBook), he won’t be able to access your NextLifeBook information.

Administrative Access to your Information

Our strict internal procedures prevent any NextLifeBook employee or administrator from gaining access to your account, beyond a limited set of data necessary to help grant you access to your account (e.g. triggering email reset) . NextLifeBook administrators can never access to your NextLifeBook account information. NextLifeBook logs and regularly audits all accesses to your account.

Operational Procedures to Keep the Site Secure

NextLifeBook follows best practices to keep your data secure. We regularly audit our environments and code for security issues and apply patches expeditiously. We retain our own security experts to probe and verify the security of our site.