How can Acronis Notary be used, and why should you care?
Acronis Notary adds an extra level of confidence to the authenticity of your personal and business data. In the future, you may want to simply reassure yourself that a file you previously stored or backed up has remained unchanged since then. Or you may have a file (or someone may present you with a file) that you need to validate, confirming it is authentic and unchanged from its backup. Common potential uses include property records, court documents, and long-term archives that could be subject to legal or tax audits.
Take the first step towards peace of mind.
Provide confidence that data is authentic and unchanged
Blockchain-based service for file notarization, e-signing and verification
Now 30% OFF!
Now 52% OFF!
Now 60% OFF!
You can request for custom configuration For 30 days FREE TRIAL use promo code FREETRIAL during checkout. Don't know where to start contact us for help
Prove that a document is unchanged (or changed)
Suppose you have an executed agreement that is backed up to local storage or the Acronis Cloud. The other party to the agreement also receives a digital copy of the exact same document. In a few months, you get a call from the other party telling you that you didn’t fulfill the contract. That party shows you a document that seems to be original. But you suspect they made some changes to it.
Using Acronis Notary technology, you compare a certificate you generated for this “new” document with the original document’s certificate. That way, you can be sure that the recent document is an identical bit-for-bit match to the one you have in backup storage. If they don’t match, you know that the other party has changed the document in some way and can confirm what they have is not the original document.
Confirm a creative work originated on a certain date
A visual or musical artist may be skeptical about publishing creative assets on the internet. Using Acronis Notary certification — a tool for copyright protection that can help confirm the date of origin — can change his mind. To do this, the artist creates a backup that contains pieces of digital art, music, photos, or anything else that can be copyrighted. Once the backup is complete, he can obtain a certificate with cryptographic evidence that could help his copyright claim in case of infringement. The record of the original pieces and their creation dates are recorded in the blockchain. Artist can confirm that his piece of art existed at a certain time in the past, was authored by him and assist his copyright claims.
Prove a legal document existed when you claim it did
Lawyers may need to prove to a judge and jury that a file in their possession has been in existence since a certain date and time. Using Acronis Notary, they can tie the file in their possession to data on the blockchain, which mathematically proves the existence of that exact file at the specific, earlier date in question.
Confirm bills were paid when you said they were paid
A company keeps an archive of all of its old, paid invoices in a notarized backup. One day, the company receives a letter demanding payment for an invoice that was paid two years ago. The record in the blockchain is permanent and immutable, so the company can confirm that this invoice was re-sent by mistake."
Confirm product certifications are unchanged
A consumer buys a certified diamond with an associated serial number on it. He backs up the diamond’s “warranty of authenticity” and proof of purchase with Acronis Notary. After some time, he decides to sell the diamond. A prospective buyer can use Acronis Notary to verify that the diamond’s purchase records are unchanged, so he can confidently move forward with a third-party’s professional gemstone evaluation.30 days FREE Trial
Frequently Asked Questions.
How Secure will my data be?
Your data is always only yours at an Acronis Data Center
Acronis Data Centers identifies all the incoming data with your account. Only you can access the data, whether you restore only one file or the whole machine.
Your data is encrypted even before it is sent
Acronis Backup and Acronis Backup Advanced, powered by Acronis AnyData Engine, encrypt your data at-source with government-approved AES-256 encryption, before sending it over to secure Acronis Data Center. You set up the password – and only you can access it.
Even metadata is encrypted
All management communication between your system and the Acronis Cloud runs through secure channels with SSL encryption. At any moment in time, all aspects of your data are secure.
Acronis Data Centers are highly secure
Physical security is ensured via high fences, 24x7 security personnel, and video surveillance with 90-day archiving. Biometric hand-geometry scan and proximity key card are required for access.
How Safe will my data be?
Acronis Data Centers are Tier-IV designed
Acronis Data Centers are equipped with UPSs and backup diesel-generators. They are designed to ensure constant power availability for up to 48 hours to sustain an undefined power outage. In addition, there are redundant HVAC, network and UPSs. The Tier-IV data centres do not interrupt availability for any planned activity, and can sustain at least one worstcase scenario unplanned event with no critical impact. With 99.995% availability, Tier-IV is the highest availability level for any data centre on the planet.
Acronis Data Centers are SSAE-16 certified
SSAE-16 is a framework for a data centre organisation to have an outside entity examine their internal controls. Compliance sensitive companies often require SSAE-16 certification, which include publicly traded enterprises, financial firms, and healthcare organisations.
Your backups are safe on reliable Acronis storage
Acronis Storage is state-of-the-art software-defined storage, running Acronis’ proprietary implementation of Reed-Solomon’s data chunk distribution, coupled with outstanding redundancy and error correction. Acronis Storage exists only for one purpose – safety and security of your data.
Modernize your cybersecurity and backup with integrated cyber protection
SAFETY     ACCESSIBILITY     PRIVACY     AUTHENTICITY     SECURITY.