Our servers are designed to only accept encrypted SSL connections which blocks a man-in-the-middle and session hijacking attacks.
Encrypted storage
Passwords and verification tokens are stored encrypted using modern and state-of-the-art solutions. We don't store plain data but use cryptographic hash functions.
Documents integrity
A digital checksum (mathematical hash value) validates that documents haven’t been tampered after each signing event, to ensure the integrity of customer documents.
Signature authenticity
Customers can rely on the authenticity of signers through signature verification and unalterable capture of signers names, emails, IP addresses, signing events, timestamps and completion status.