Note: This feature (and documentation) is in BETA. Some parts may change based on user feedback. If you have a problem or an idea for an improvement, please let me know!

Requests ᴮᴱᵀᴬ offer a secure way to receive sensitive data, such as text or files, from colleagues, clients, or customers.

This feature allows you to send a request using a secret URL and securely receive a response without compromising security or exposing sensitive data.

Further, to minimize risk and respect recipient data, sensitive information is automatically deleted after a preset duration that you specify.

How Does It Work?

  1. Create a request.
  2. A secret URL is generated.
  3. Share the secret URL with your recipient.
  4. The recipient responds to the request with text or files.
  5. Receive a notification when the response is submitted, with a preset time limit for retrieval.

Key Benefits

  • Enhanced Security: Requests ensure sensitive data is securely transmitted, managed and deleted, reducing the risk of unauthorized access.
  • Lifecycle Audit Logs: Track every stage of the request, including creation, access, response and deletion. Logs show failed access and unauthorized attempts, and are available indefinitely.
  • Automatic Deletion: Once a response is received, requests expire and self-delete after a preset duration, ensuring transmitted data is irretrievable after expiration and request closure.
  • Compliance: Requests help meet regulatory standards (e.g., GDPR, HIPAA, PCI-DSS) by minimizing the risk of data exposure.
  • Improved User Experience: Provides a smooth, secure way to request sensitive data, avoiding the risks of insecure channels.
  • Reduced Risk of Data Breaches: Data encryption and secure transmission minimize the impact of potential breaches.

Automatic Expiration and Deletion

Responses to requests automatically expire and self-delete after a preset duration, ensuring recipient data is secure. Set the expiration time when creating a request, and be sure to retrieve the response before the deadline.


Comprehensive Lifecycle Tracking

A detailed audit log tracks every stage of the request’s lifecycle:

  • Timestamps: Records creation, access (both successful and failed), expiration, and deletion.
  • Access Details: Logs IP addresses, browser signatures, and device information of anyone accessing the request.
  • Request Metadata: Includes transmitted data types, expiration status, and deletion confirmation, ensuring complete removal from the system.

What Do End Users See?

Recipients accessing the secret URL will see a simple, unbranded page displaying the request contents. This streamlined design reduces confusion and enhances the user experience.

Note: Premium & Pro users can utilize branded request pages. Learn more.

Unbranded Request Delivery Branded & Customized Request Delivery - this is what your recipients will see. Branded & Customized Request Received - this is shown after a response has been received. Response Retrieval - this page is used to retrieve the response to the request. Request Audit Log - Track the entire lifecycle of your request.
Screenshots of various Request pages.

Best Practices for Using Requests

  • Shorter Expiration Windows: Set shorter expiration times to minimize the risk of exposure.
  • Compartmentalize: Don’t request correlated sensitive information like usernames and passwords together; use separate requests.
  • Monitor Access & Expiration: Ensure recipients respond promptly, and requests expire quickly.
  • Use Passphrase Lockdown: Enable passphrase protection for additional security. Both successful and failed attempts are logged.

Updated: