Compliance Guidelines

Important Notice

Cryptio is designed exclusively for authorized data protection and encryption purposes. Users must:

  • Obtain proper authorization before encrypting organizational data
  • Comply with all applicable data protection and privacy laws
  • Follow organizational policies regarding data encryption
  • Maintain secure storage and management of encryption keys

Legal Requirements

  • Users must be 18 years or older
  • Basic licenses limited to single user with 3 devices
  • Professional licenses support single user with 6 devices
  • Enterprise licenses support up to 10 named users with 20 devices
  • All licenses are non-transferable
  • Export control laws apply to encryption software

Regulatory Compliance Support

Cryptio is designed to help organizations meet various compliance requirements:

Supported Standards:

  • GDPR (General Data Protection Regulation)
  • HIPAA (Health Insurance Portability Act)
  • SOX (Sarbanes-Oxley Act)
  • NIST Cybersecurity Framework

Encryption Standards:

  • AES-256 (NIST Approved)
  • ChaCha20-Poly1305
  • RSA-2048/4096
  • Elliptic Curve Cryptography

Data Protection Requirements

  • Encryption keys must be protected with strong passwords or passphrases
  • Regular backup of encryption keys is recommended for data recovery
  • Audit logs should be maintained for compliance reporting
  • Access to encrypted data should follow principle of least privilege
  • Encryption policies should be documented and followed consistently

Export Control Notice

Cryptio contains encryption technology that may be subject to export controls under various national and international laws. Users are responsible for complying with applicable export control regulations in their jurisdiction.

Professional Use Guidelines

  • Encryption should be part of a comprehensive data protection strategy
  • Regular security assessments and updates are recommended
  • Employee training on proper encryption practices is essential
  • Incident response procedures should include encrypted data scenarios
  • Regular compliance audits should verify proper encryption usage