How can we be sure the system is protected from hacking?
We did the following:
1) Personal information is protected by encryption and biometric data
2) Data is hosted on users device
3) User is able to chose information provided to service
4) Document verification with digital sign