top of page

FAQs

Explore a list of our most frequently asked questions.

General

What is "Military-grade" encryption?

People often use the phrase ‘military-grade’ to mean AES-256. Côntrol uses modern encryption and endpoint enforcement so you can share data while keeping control of access and usage.

Why do recipients need the app?

Because Côntrol enforces policy at the endpoint. Installing the app creates a secure viewing environment so controls like revoke, time windows, geofencing, and DRM can be enforced consistently.

Why do I need an account?

Accounts let us verify identity and apply policy decisions. The protected data stays inside the container; identity/policy checks happen during access.

How does Côntrol™ protect my data and keep it secure even after it leaves my device?

We separate access and usage rights from the data at the device level. This enables us to first verify that the individual trying to decrypt your data is an authorized user. If they are, then we enforce all usage and access rights that you selected, which ensures that authorized users can only use the data as you, the data author, choose. This approach is designed so the protected content stays in the secure container and isn’t stored on DataRock servers.

What do I get with a Professional plan?

Professional plans unlock advanced controls: revoke/shred, read receipts, save/copy/print/forward restrictions, time fencing, and geofencing.

Can I open a vault offline?

Not currently. Côntrol performs an online identity + policy check during decryption so controls like revoke, time windows, and geofencing can be enforced.

Can I save secure drafts and edit them later?

Yes, if you are using the Côntrol Microsoft Outlook Add-in to create new messages, simply type the message content and save it as a draft. If you’re using the Côntrol desktop and mobile applications, you will not have the option to save drafts.

Are there any limitations on how a .VGAR file can be shared digitally?

Yes. A Côntrol vault file can be shared like any other file (email, chat, drive). Policy enforcement occurs when someone attempts to open it.

Where do vaults save to on my desktop?

Vaults are saved like any other file. If you prefer, you can create a special folder for all your secure vaults.

What does ‘Zero Trust’ mean in Côntrol?

Zero Trust means every access attempt is verified—identity, authorization, and policy checks—rather than assuming anything is ‘trusted’ by default.

What key principles of zero-trust do I gain using Côntrol™?

Micro-perimeters around protected data objects. Identity verification (incl. MFA where configured). Least-privilege authorization + usage controls.

What is the Côntrol™ advantage?

Perpetual protection and control of data that has left your possession Platform/Domain independent Simple, intuitive user experience No key management = light and scalable deployment. Our patent pending “Transient Key” technology means that there are no keys to manage and no keys for threat actors to steal. Liability Protection: Chain-of-Custody reporting and analytics provide attestation of data protection and control even in the event of a network or system breach.

What advantages do I have with the Côntrol™ Solution?

Using a unique combination of multi-layered encryption, multi-factor authentication, geo-fencing, and Digital Rights Management (DRM) technologies, Côntrol creates a micro-perimeter around each protected data object—so control travels with the file, wherever it goes. This micro-perimeter travels with the data NO MATTER WHERE IT GOES — down the street, across the country, or around the world — forever. User identity, location, and other factors are transparently verified before each and every access attempt.

Can I change my email address?

No, however, you can add as many email addresses as you like. You must have access to the email to verify that you own it.

How can I cancel my subscription?

You can cancel your account by submitting a ticket through our Support Center.

What are the differences between removing a device and disabling a device?

Disabling a device temporarily prevents anyone from being able to open a secure vault with your account on a specific device. Removing a device permanently removes it from the list of devices that are tied to your account. If you choose to add your account back to a device you previously removed it from, you will be notified via email that your account has been added to a new device.

Usage and Access Rights

What is DRM?

Data Rights Management (DRM) lets you control what recipients can do after opening the data (save/copy/print/forward) and where/when it can be opened.

What is time fencing?

Time fencing is a type of DRM that allows you to control when your data can be accessed.

What is geofencing?

Geofencing is a type of DRM that allows you to control where your data can be accessed.

What is the difference between revoke and shred?

Revoke: removes access for recipients. Shred: permanently disables access for everyone, including the author.

What file types can you currently enforce DRM on?

Supported DRM-enforced viewing types currently include: .bmp, .docx, .gif, .jpg, .html, .pdf, .png, .tiff, .txt

Can I make sure that the person I am sending data to doesn’t share that information with someone else?

Yes, our DRM features allow you to choose if you want to allow authorized users to copy, print, and save your data.

Can I see who, when, and where my data was accessed even if that data was shared with another individual?

Not currently. Expanded access analytics (including forwarded-path visibility) is on the roadmap.

Why do usage and access rights not affect me?

We believe that you, as the data owner should always have access to your data; however, if you would like to permanently remove even your access to a secure vault, you can use the shred feature.

Can I selectively revoke access to secure vaults that I sent to multiple authorized recipients?

Currently, revoke works as an all-or-nothing function. If you, the data author, revoke access to a secure vault you shared with others, you are revoking access for every authorized user.

How does Côntrol™ make sure the right people have access to my data?

User identity, location, and other factors are transparently verified before each and every access attempt.

Encryption

Can I encrypt a zip file?

Yes, you can encrypt a zip file; however, we cannot enforce any usage and access rights on the files contained within the zip file.

What files types can I encrypt?

There are no limits on the types of files that can be encrypted; however, we can only enforce usage and access rights on the types of files we have viewers for.

How many files can I encrypt at one time?

There are no limits on the number of files we can encrypt at one time; however, we are limited by your computer’s storage and memory limitations.

Do I or any of the authorized users need to be online to view an encrypted file?

Yes—an online check is required to verify identity and enforce policies (like revoke/time/geofence). The protected content itself remains inside the secure container and isn’t stored on DataRock servers.

Applications

What operating systems versions will be supported?

Windows 10+ macOS X 10.14+ iOS 14+ Android 8+

Will my Côntrol™ applications automatically update?

The Côntrol application will notify you every time an update is available, and you can choose to update it whenever you like.

Is there a way to import my contacts with out having to enter them one at a time?

Yes, you can import contacts from Microsoft Outlook.

When I create my vault in iOS or Android, where will I be able to find the file so I can send it?

iOS: Files can be accessed via the Files app on your iPhone or iPad. The quickest way to find this app is with Spotlight Search. Swipe one finger downward from the middle of the Home screen to bring up the search box, type “Files” and tap “Files” in the search results.

Why is Microsoft Outlook recommended on Windows?

so you can send protected messages from the email client teams already use—without changing habits.

DataRock Technologies, Inc.

(904) 428-0096
support@datarock.biz

101 Kendalia Circle
Spring Branch, TX 78070

  • LinkedIn

© 2026 DataRock Technologies, Inc. All rights reserved.

ElephantSqlDB® is a registered trademark of ElephantSqlDB, Inc.

bottom of page