How Signority Secures Your Data

How Signority Secures Your Data

How Signority Secures Your Data

My last blog, Three Stages of Data; In Transit, At Rest, & In Use described each of the three data stages and touched on how each stage requires a different approach to security and privacy. Today we are going to talk about:

  1. when your data enters each of the three stages during the workflow, and
  2. how Signority secures your data. 
Three Stages of Data
Three Stages of Data

If you’ve used Signority you know that every document has a workflow.  The workflow begins at the creation of the document and ends when it’s been stored after it has been signed by all participants.

During the it’s workflow your document and any data related to it, enters all three stages of data at various times. Here is each of the data stages and when your document enters that stage during the workflow.

In Transit: Your information related to your document is in transit (or in motion) when:

  1. someone registers for a new account
  2. you send the email notifications to the signers that there is a document ready for signing, and,
  3. when the document has completed the workflow, meaning it has been signed by everyone, and a copy of the document is sent to each of the document participants (senders and recipients).

At Rest: All information related to the document and the document itself is at rest:

  1. when it is waiting for the next person in the workflow to sign the document
  2. it is stored on our servers once the workflow has been completed.

In Use: Your document and any related data, i.e.: the audit trail, are ‘in use’:

  1. when a recipient or user are editing the document by adding the required information and/or signatures
  2. the Signority platform is updating the audit trail with any actions, i.e.: signed, id verification, etc.

Signority starts our security process with our employees. All employees and sub-contractors must be security cleared with the federal government security clearance program. And they must complete a minimum amount of security and compliance training each year.

For In Transit and In Use data Signority eSignature Platform services using strongly encrypted extended validation (EV) Transport Layer Security (TLS) certificates to encrypt the data in transit between users and the Signority eSignature Platform. We only allow the highest security TLS 1.2 and 1.3 protocols, and do not allow weaker TLS or SSL.  The article linked above explains in detail what EV and TLS certificates are, what they do, and why we use them. 

If you would like to know our rating, here is the most current certificate for Signority at the time of this blog post.

We also do not allow the use of older browser versions. Older versions are not updated with the latest security features and updates to ensure a secure browsing connection.

Data at rest data at rest is encrypted by using state-of-the-art AWS encryption technology and we salt usernames & passwords. 

What is a ‘salted’ username and password?  A salted username and password is a process where they are converted through a ‘hashing algorithm’ into an unintelligible series of numbers and letters. You can read a more detailed breakdown here at Okta.com.

Plus, we offer masked tags for end users to encrypt their sensitive information on documents.

If you are not a technical person, think of it this way:

  1. Your information is locked in a box that requires a key.
  2. That key is locked in another box that requires another key to open it.
  3. And that box, with your box, is in a box that is password protected. 

So your data is guarded with multiple layers of protection ensuring your data is secure and private.

If you would like to know more about how Signority protects customers data and privacy I encourage you to go to our Trust Centre. In Signority’s Trust Centre you can review our approach to Security, Privacy, Compliance, and Legislation (Legal).

Have questions? 

Contact us by:

  • calling at 833-222-1088,
  • using the chat icon on the bottom right of your screen,
  • or through our contact form.

Look for my next blog, ‘What is Data Residency? And Does it Matter?

The Three Stages of Data

Three Stages of Data

The Three Stages of Data; In Transit, At Rest, In Use

What are the three stages of data and what is the difference?

When evaluating the security of a new software for use within your organization, such as an eSignature software, you may have come across terms like ‘Data at Rest’ and ‘Data in Transit’.  

These phrases indicate the stage your data is in and are often used when discussing the protection of data. The approach and methods required to protect your data changes depending on the type of information you are looking to protect and what stage it is in.  To learn more about securing your data, read this article on Data Security.

Before you learn how to protect your data you must first understand the three different stages of your data because each stage requires a different approach. 

They are: Data in Transit, Data at Rest, and Data in Use.

Three Stages of Data

Data in Transit, sometimes referred to as ‘data in motion’, is data that is actively moving from one point, or location, to another. It can be traveling across the internet or through a private network.  Data in motion is also data being transferred from a local storage location (hard drive, USB, etc.) to a cloud storage device (Google Drive, OneDrive, Box, etc.).

You create data in transit each time you upload information to a partner organizations site, download the balance of your savings account from your bank online, or save something to a USB flash drive.

Data at Rest is data that is not actively moving from device to device or network to network. This data is usually stored on a hard drive, in the cloud, on a USB, or stored in some other way.

And ‘Data in Use’ is data that is being stored passively in a stable destination, but is being utilized in other parts of the IT architecture. It may be in the process of being created, edited or updated, erased, or accessed through different interface endpoints. 

Think of a document you have on our computer that you update, edit, or delete. Any of those actions create the instance of the document and its data being ‘in use’. 

There is also one other aspect to data that will be talked about, Data Residency.  Data Residency deals with where your data is stored. When we talk about where your data is stored we are not speaking about the kind of device or drive it is on but where is it located in the world.  

Data Residency is a key factor in many data laws or regulatory requirements imposed on data that govern a country or region in which it resides.  These laws address key requirements in data protection and privacy. When evaluating a software look for their Trust Centre, this is where they will explain how they protect your data and privacy.

Protecting sensitive data is a high priority for any organization. And, as previously mentioned, the approach and methods required to protect your data changes depending on the type of information you are looking to protect and what stage it is in.

Data at rest is often considered to be less vulnerable than data in motion, but hackers and nefarious individuals often prefer data at rest and find it a more valuable target than data in transit.

We will review some of the methods used to protect data in each stage in an upcoming blog. 

Educational Institutions Need to Implement eSignatures

Why Educational Institutions Need eSignatures

Educational Institutions Need to Implement eSignatures

In order to keep up with the ever-changing digital world, educational institutions need to implement eSignatures into their operations. Technology has had a tremendous impact on the education sector, and it’s important for schools and colleges to keep up with the latest trends. Electronic signatures are one of the many ways that institutions can modernize their processes.

Here are three reasons why eSignatures are so important for schools:

  1. Efficiency: When administration staff is bogged down with paperwork, it can significantly impact their ability to complete other tasks. eSignatures allow you to sign documents and approvals quickly and easily, without the need for a physical signature.
  2. Security: Documents signed with eSignatures are more secure than those that are not, as they cannot be tampered with or modified.
  3. Compliance: Many government agencies and organizations require electronic signatures for compliance purposes. Using eSignatures can help your school stay compliant with regulations.

Security wise eSignatures a lot more secure than paper. Paper can get lost, stolen, someone can copy it without someone knowing, and it can easily get damaged resulting in the loss of information.  The most secure signature is a Digital Signature. You can learn more about the differences between eSignatures and Digital Signature here.

To be compliant you have to follow certain guidelines and practices that your local governments or industry regulators have set up to ensure the security and safety of the documents and their signatures.

For example, some Canadian educational systems cannot have data that is stored off-site on a server that is located outside of Canada. The data also cannot go outside of Canada’s borders while in transit. This means you have to find an eSignature service like Signority

Signority guarantees your data stays safe and secure in Canada, both in transit and at rest. This means your student’s data will never travel or reside outside of Canada’s borders.

Now, let's look at efficiency.

When I think of paperwork and schools, as a parent, I think of registration forms and permission slips. Let’s use these as our use case.

Each year you have to confirm the number of students who will be returning as well as register any new students. What are some
of the issues you have probably faced when going through this process.

  •  A rush of last-minute parents coming in to register their child(ren) the week before school starts. 
  • Incomplete and missing paperwork with signatures in the wrong place.
  • Trying to get the signatures of both parents when they are divorced or separated. 

With an eSignature platform you can automate the whole process and ensure that all the information is given where it’s required. Now let’s see what the top 6 features that will help you the most.

  1. Automated workflow. With the automated workflow feature set who to send the document package to and in what order. Each recipient receives an email notifying them they have a document. You can even set up auto-reminders that go out if someone takes too long to sign.  
  2. Templates. Setting up the school registration forms as templates means you are always ready to go – all you have to do is enter the parent’s name(s) and emails. And if you need to do 2, 20, or 200 at once, use a bulk sign template to send them in less than 5 minutes! 
  3. Multi-document package. One document package can consist of the registration form health forms, the list of required supplies, and the waiver. Just upload whatever files you need in the package one at a time or using bulk select. They can even be different file formats. 
  4. Automated email reminders. Forget having to pick up the phone or send another email.  This feature allows you to determine when and how often the parents or school staff and officials will receive an automatic email reminder if they haven’t signed the document yet. This simple nudge encourages them to do their part while saving you time. 
  5. Template Link. Put a registration form on the school website so parents or students can register for an event. You can even put the registration form online for new student registrations. 
  6. Masked Tag: A masked tag will take any information entered into it, encrypt it, and conceal it from everyone in the workflow. This feature is especially useful for a student’s personal information like their health card numbers, student numbers, etc.

Having and using these six features in any eSignature platform can save you and your staff time and increase productivity.

BONUS - you help save the planet

There is one more really big benefit to using eSignatures.  Sustainability.  How much paper and printer/copier ink do you go through each year?  I encourage you to check your budget. I’m sure you will find on the paper side, it’s a lot of trees. Remember, “Today is the opportunity to build the tomorrow you want.” ~ Ken Poirot.

Finally, I would like to ask you to consider the other savings you get along with eSignatures being a green technology. You save time and money.

Consider the time it takes to: 

  • chase people for the signed documents,
  • having someone travel to deliver the document,
  • and then filing the document or scanning it back into your system.

Adopting eSignatures into your operations saves an average of $20 per document. Think about that. They save you time, money, and the environment.  But don’t take our word for it, see for yourself with this article on Financesonline.com.

If you would like to learn more about eSignatures and the features available that may help you Signority’s tutorial page is a great resource.

And to see how well an eSignature Platform would work for you then I encourage you to take advantage of our free no obligation 2-week trial.

Look for my next blog where I write about Working from Home and eSignatures

Have a great week everyone

Security Features You Need in an eSignature Platform

Security Features You Need in an eSignature Platform

Your organization has decided to start using eSignatures and you have been tasked with researching the different options available in the marketplace. The first thing you have to do is research the basic security features you need in an eSignature platform.  Then you can move on to the obvious, Price, Ease of use, Scalability, Reviews, and Features.

Why?  Because you need to ensure all your documents and data is protected. You also have to ensure the signatures can be verified.

In order to ensure the integrity and veracity of the final document and signatures you need to be able to:

  1. Secure the document and signatures
  2. Verify the signer’s identities
  3. Protect any confidential information entered
  4. Track the document and signatories
  5. Restrict access

Here are the basic security features you need in an eSignature platform:

  1. Digital Signatures
  2. Masked Text
  3. Signer Identity Verification
  4. Multi-Factor Authentication (MFA) and Single Sign On (SSO)
  5. Audit Trail
  6. Team Account Roles & Permissions

The first security feature you need is a Digital Signature.  Wait… what?  I thought eSignatures are Digital Signatures.  Aren’t they the same thing?

No, that is a common mistake many people make. And it is one that will determine the security of the document and signatures. Here are the definitions as quoted from the post eSignatures vs Digital Signatures

“An electronic signature is information in electronic form (can be sound, symbol, process, etc.) that is associated or attached to a document. This means that so long as we can demonstrate that the signature is associated with a person and that there was intent to sign, everything is legally binding and accepted (all of this can be seen in Signority’s audit trail).

 

A digital signature is actually a form of electronic signature that uses an encryption algorithm that helps validate who the signer is. It also ensures that the document cannot be tampered with, as the signature becomes invalid if the document is changed after signing. This helps prevent repudiation by the signer, making it almost impossible to deny having signed the signature. Essentially, these issues are some of the biggest challenges to electronic signatures, and digital signatures are able to help overcome these issues.”

For a much more comprehensive explanation from a cybersecurity perspective read this post about digital signatures on TechTarget.com.

Next is the Masked Tag.  This tag allows you to protect your signatory’s personally identifiable information (PII) and other confidential information. If you work in the healthcare field for example, you may ask someone for their insurance information.  You want to make sure that no one else sees this information.

Using a masked text tag will allow your signer to securely enter PII into the form where you request it.  The masked tag will conceal and encrypt the information entered once the signer has filled it out.  This means anyone who receives the document for signing after this signer will only see the title of the tag you entered, i.e.: Health Card.

Because the information is encrypted, the person who needs that information, the document sender, will have to follow very specific steps to retrieve that information securely and confidentially.

To help ensure the integrity of a signature you need a Signer Identity Verification feature. This feature will send a one-time use PIN code to the signer either by email or SMS (text message). They will need to have this code in order to access the document.  Once they have used the PIN code to access the document an action will be logged. Using this code verifies the signer received it on an account that can be traced back to them. The log, or audit trail, will document that the signer’s identity has been verified and how it was verified.

And now that you have verified your signers identity, let’s look a little closer to home.  You need to secure access to the eSignature platform. You don’t want just anyone having access to your clients, partners, and company’s information. To do this your organization can either set up Single Sign On (SSO) or a Multi-Factor Authentication (MFA) Login. These sign in methods help restrict access and lower instances of phishing and make it much more difficult for hackers.

As stated in this great explanation of SSO by TechTarget.com, “Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials — for example, a name and password — to access multiple applications.” This ensures that unless someone can be verified through your companies main system, they cannot get in. The referenced article does a great job of explaining it.

If your company cannot use SSO then the application you select should, at the very least, offer MFA.  As stated at precisely.com, “Multiple factor authentication verifies a user’s identity by combining two or more of the following independent credentials:

  • Something the user knows (e.g.: password, PIN, passphrase)
  • Something the user possesses (e.g.: email account, smartphone, code-generating device)
  • Something inherent to the user (e.g.: fingerprint, iris scan, voice recognition)”

The Audit Trail is the next security feature we will review.  The Audit Trail is a document that comes with your final copy of the signed document. It can be a part of the final document or arrive as a separate document. It has three main components: the meta data, the Signers, and the History. The audit trail will show you who did what action (signing the document), the timestamp associated with the action, their IP Address, and if required any notes. A note can include the ID Authentication method and include a partial email address or phone number. An example confirming SMS ID Authentication in an Audit Trail can be seen in the image below.

 

ID Authentication Audit Trail log

Finally, you need to have the ability to set up team account roles and permissions. The ability to assign roles and permissions helps you keep your documents secure by restricting who has access to what and when. For a clearer understanding of how roles and permissions may be set up you can review the roles available in Signority. You don’t want everyone in your organization being able to view the documents sent by legal or finance, do you?

Here is a bonus feature. The Retention feature. Depending on the industry you work in your organization may be required to have a retention policy. If you are unsure whether you need a retention policy I strongly encourage you to do some research to find out.  Interdyn has a great article called Data Retention Policy 101 that reviews what a retention policy is, the questions you need to ask, and how to set one up.  I highly recommend you read this if you do not have a policy in place.

A retention feature allows you to apply your retention policy to all the documents that have been signed digitally. And a good one will allow give you ways to automate the whole process. This post gives a good overview of a retention feature and the options available within one. You will see it is easy to set up and helps you ensure compliance.

And those are the basic security features you need in an eSignature platform.

Look out for next weeks edition where I will review the differences between Adobe Signature and Signority eSignatures in the post, “Adobe vs Signority“.

Until then, have a great week and stay safe.

Security Features You Need in an eSignature Platform

Your organization has decided to start using eSignatures and you have been tasked with researching the different options available in the marketplace. The first thing you have to do is research the basic security features you need in an eSignature platform.  Then you can move on to the obvious, Price, Ease of use, Scalability, Reviews, and Features.

Why?  Because you need to ensure all your documents and data is protected. You also have to ensure the signatures can be verified.

In order to ensure the integrity and veracity of the final document and signatures you need to be able to:

  1. Secure the document and signatures
  2. Verify the signer’s identities
  3. Protect any confidential information entered
  4. Track the document and signatories
  5. Restrict access

Here are the basic security features you need in an eSignature platform:

  1. Digital Signatures
  2. Masked Text
  3. Signer Identity Verification
  4. Multi-Factor Authentication (MFA) and Single Sign On (SSO)
  5. Audit Trail
  6. Team Account Roles & Permissions

The first security feature you need is a Digital Signature.  Wait… what?  I thought eSignatures are Digital Signatures.  Aren’t they the same thing?

No, that is a common mistake many people make. And it is one that will determine the security of the document and signatures. Here are the definitions as quoted from the post eSignatures vs Digital Signatures

“An electronic signature is information in electronic form (can be sound, symbol, process, etc.) that is associated or attached to a document. This means that so long as we can demonstrate that the signature is associated with a person and that there was intent to sign, everything is legally binding and accepted (all of this can be seen in Signority’s audit trail).

 

A digital signature is actually a form of electronic signature that uses an encryption algorithm that helps validate who the signer is. It also ensures that the document cannot be tampered with, as the signature becomes invalid if the document is changed after signing. This helps prevent repudiation by the signer, making it almost impossible to deny having signed the signature. Essentially, these issues are some of the biggest challenges to electronic signatures, and digital signatures are able to help overcome these issues.”

For a much more comprehensive explanation from a cybersecurity perspective read this post about digital signatures on TechTarget.com.

Next is the Masked Tag.  This tag allows you to protect your signatory’s personally identifiable information (PII) and other confidential information. If you work in the healthcare field for example, you may ask someone for their insurance information.  You want to make sure that no one else sees this information.

Using a masked text tag will allow your signer to securely enter PII into the form where you request it.  The masked tag will conceal and encrypt the information entered once the signer has filled it out.  This means anyone who receives the document for signing after this signer will only see the title of the tag you entered, i.e.: Health Card.

Because the information is encrypted, the person who needs that information, the document sender, will have to follow very specific steps to retrieve that information securely and confidentially.

To help ensure the integrity of a signature you need a Signer Identity Verification feature. This feature will send a one-time use PIN code to the signer either by email or SMS (text message). They will need to have this code in order to access the document.  Once they have used the PIN code to access the document an action will be logged. Using this code verifies the signer received it on an account that can be traced back to them. The log, or audit trail, will document that the signer’s identity has been verified and how it was verified.

And now that you have verified your signers identity, let’s look a little closer to home.  You need to secure access to the eSignature platform. You don’t want just anyone having access to your clients, partners, and company’s information. To do this your organization can either set up Single Sign On (SSO) or a Multi-Factor Authentication (MFA) Login. These sign in methods help restrict access and lower instances of phishing and make it much more difficult for hackers.

As stated in this great explanation of SSO by TechTarget.com, “Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials — for example, a name and password — to access multiple applications.” This ensures that unless someone can be verified through your companies main system, they cannot get in. The referenced article does a great job of explaining it.

If your company cannot use SSO then the application you select should, at the very least, offer MFA.  As stated at precisely.com, “Multiple factor authentication verifies a user’s identity by combining two or more of the following independent credentials:

  • Something the user knows (e.g.: password, PIN, passphrase)
  • Something the user possesses (e.g.: email account, smartphone, code-generating device)
  • Something inherent to the user (e.g.: fingerprint, iris scan, voice recognition)”

The Audit Trail is the next security feature we will review.  The Audit Trail is a document that comes with your final copy of the signed document. It can be a part of the final document or arrive as a separate document. It has three main components: the meta data, the Signers, and the History. The audit trail will show you who did what action (signing the document), the timestamp associated with the action, their IP Address, and if required any notes. A note can include the ID Authentication method and include a partial email address or phone number. An example confirming SMS ID Authentication in an Audit Trail can be seen in the image below.

 

ID Authentication Audit Trail log

Finally, you need to have the ability to set up team account roles and permissions. The ability to assign roles and permissions helps you keep your documents secure by restricting who has access to what and when. For a clearer understanding of how roles and permissions may be set up you can review the roles available in Signority. You don’t want everyone in your organization being able to view the documents sent by legal or finance, do you?

Here is a bonus feature. The Retention feature. Depending on the industry you work in your organization may be required to have a retention policy. If you are unsure whether you need a retention policy I strongly encourage you to do some research to find out.  Interdyn has a great article called Data Retention Policy 101 that reviews what a retention policy is, the questions you need to ask, and how to set one up.  I highly recommend you read this if you do not have a policy in place.

A retention feature allows you to apply your retention policy to all the documents that have been signed digitally. And a good one will allow give you ways to automate the whole process. This post gives a good overview of a retention feature and the options available within one. You will see it is easy to set up and helps you ensure compliance.

And those are the basic security features you need in an eSignature platform.

Look out for next weeks edition where I will review the differences between Adobe Signature and Signority eSignatures in the post, “Adobe vs Signority“.

Until then, have a great week and stay safe.

Security Features You Need in an eSignature Platform

Your organization has decided to start using eSignatures and you have been tasked with researching the different options available in the marketplace. The first thing you have to do is research the basic security features you need in an eSignature platform.  Then you can move on to the obvious, Price, Ease of use, Scalability, Reviews, and Features.

Why?  Because you need to ensure all your documents and data is protected. You also have to ensure the signatures can be verified.

In order to ensure the integrity and veracity of the final document and signatures you need to be able to:

  1. Secure the document and signatures
  2. Verify the signer’s identities
  3. Protect any confidential information entered
  4. Track the document and signatories
  5. Restrict access

Here are the basic security features you need in an eSignature platform:

  1. Digital Signatures
  2. Masked Text
  3. Signer Identity Verification
  4. Multi-Factor Authentication (MFA) and Single Sign On (SSO)
  5. Audit Trail
  6. Team Account Roles & Permissions

The first security feature you need is a Digital Signature.  Wait… what?  I thought eSignatures are Digital Signatures.  Aren’t they the same thing?

No, that is a common mistake many people make. And it is one that will determine the security of the document and signatures. Here are the definitions as quoted from the post eSignatures vs Digital Signatures

“An electronic signature is information in electronic form (can be sound, symbol, process, etc.) that is associated or attached to a document. This means that so long as we can demonstrate that the signature is associated with a person and that there was intent to sign, everything is legally binding and accepted (all of this can be seen in Signority’s audit trail).

 

A digital signature is actually a form of electronic signature that uses an encryption algorithm that helps validate who the signer is. It also ensures that the document cannot be tampered with, as the signature becomes invalid if the document is changed after signing. This helps prevent repudiation by the signer, making it almost impossible to deny having signed the signature. Essentially, these issues are some of the biggest challenges to electronic signatures, and digital signatures are able to help overcome these issues.”

For a much more comprehensive explanation from a cybersecurity perspective read this post about digital signatures on TechTarget.com.

Next is the Masked Tag.  This tag allows you to protect your signatory’s personally identifiable information (PII) and other confidential information. If you work in the healthcare field for example, you may ask someone for their insurance information.  You want to make sure that no one else sees this information.

Using a masked text tag will allow your signer to securely enter PII into the form where you request it.  The masked tag will conceal and encrypt the information entered once the signer has filled it out.  This means anyone who receives the document for signing after this signer will only see the title of the tag you entered, i.e.: Health Card.

Because the information is encrypted, the person who needs that information, the document sender, will have to follow very specific steps to retrieve that information securely and confidentially.

To help ensure the integrity of a signature you need a Signer Identity Verification feature. This feature will send a one-time use PIN code to the signer either by email or SMS (text message). They will need to have this code in order to access the document.  Once they have used the PIN code to access the document an action will be logged. Using this code verifies the signer received it on an account that can be traced back to them. The log, or audit trail, will document that the signer’s identity has been verified and how it was verified.

And now that you have verified your signers identity, let’s look a little closer to home.  You need to secure access to the eSignature platform. You don’t want just anyone having access to your clients, partners, and company’s information. To do this your organization can either set up Single Sign On (SSO) or a Multi-Factor Authentication (MFA) Login. These sign in methods help restrict access and lower instances of phishing and make it much more difficult for hackers.

As stated in this great explanation of SSO by TechTarget.com, “Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials — for example, a name and password — to access multiple applications.” This ensures that unless someone can be verified through your companies main system, they cannot get in. The referenced article does a great job of explaining it.

If your company cannot use SSO then the application you select should, at the very least, offer MFA.  As stated at precisely.com, “Multiple factor authentication verifies a user’s identity by combining two or more of the following independent credentials:

  • Something the user knows (e.g.: password, PIN, passphrase)
  • Something the user possesses (e.g.: email account, smartphone, code-generating device)
  • Something inherent to the user (e.g.: fingerprint, iris scan, voice recognition)”

The Audit Trail is the next security feature we will review.  The Audit Trail is a document that comes with your final copy of the signed document. It can be a part of the final document or arrive as a separate document. It has three main components: the meta data, the Signers, and the History. The audit trail will show you who did what action (signing the document), the timestamp associated with the action, their IP Address, and if required any notes. A note can include the ID Authentication method and include a partial email address or phone number. An example confirming SMS ID Authentication in an Audit Trail can be seen in the image below.

 

ID Authentication Audit Trail log

Finally, you need to have the ability to set up team account roles and permissions. The ability to assign roles and permissions helps you keep your documents secure by restricting who has access to what and when. For a clearer understanding of how roles and permissions may be set up you can review the roles available in Signority. You don’t want everyone in your organization being able to view the documents sent by legal or finance, do you?

Here is a bonus feature. The Retention feature. Depending on the industry you work in your organization may be required to have a retention policy. If you are unsure whether you need a retention policy I strongly encourage you to do some research to find out.  Interdyn has a great article called Data Retention Policy 101 that reviews what a retention policy is, the questions you need to ask, and how to set one up.  I highly recommend you read this if you do not have a policy in place.

A retention feature allows you to apply your retention policy to all the documents that have been signed digitally. And a good one will allow give you ways to automate the whole process. This post gives a good overview of a retention feature and the options available within one. You will see it is easy to set up and helps you ensure compliance.

And those are the basic security features you need in an eSignature platform.

Look out for next weeks edition where I will review the differences between Adobe Signature and Signority eSignatures in the post, “Adobe vs Signority“.

Until then, have a great week and stay safe.

How eSignatures Help Healthcare Staffing

How ESignatures Help Healthcare Staffing Agencies

How eSignatures Help Healthcare Staffing

Today I’m going to tell you how eSignatures help healthcare staffing  and the top 5 features needed to reap the rewards.

If you work in healthcare staffing you know that this is one of the most paper intensive areas to work. And to keep that paperwork moving takes a lot of time and effort.

See where eSignatures will have the biggest impact.

Let’s use a typical use case; you’ve hired someone and now you have to send out the hiring package for everyone’s signatures. What are some of the issues you typically run into?

You constantly have to remind someone to sign the documents. The signatures are in the wrong place and there is missing information. Required documents or IDs aren’t attached. Or someone doesn’t receive a final copy so they can do their job.

With an eSignature platform you can automate the process and significantly reduce the issues mentioned above.

Here are the top 5 features that will help you the most.
  1. Automated workflow. This feature allows you to say who to send the document package to and in what order. Each signer receives an email letting them know they have a document to sign. This can happen all at once or in a specific order you determine.
  2. Templates. Templates allow you to save a copy of the form with predetermined signing and information.  A good eSignature platform will offer you a few template formats. Here are some examples of template formats: regular templates, template links, bulk sign templates.
  3. Multi-document package. This means that your document package should be able to consist of multiple separate documents if needed. If there is one thing that will not save you time, it is having to combine all of your documents into one pdf before getting them ready for signing.
  4. Automated email reminders. Have email reminders automatically sent out on a schedule you determine if a signer is taking too long.
  5. Viewer role. This allows you to have the final document package sent to someone who may not be part of the required signings. I.e.: you may need to send a copy to finance to set up their payroll.

Using these five features can save you and your staff time and increase productivity.  But you want to know how much time eSignatures will save you and how much productivity will go up.

Here are just three of the benefits organizations have reported on average from implementing eSignatures, as published by Financesonline.com.

You read that right, companies save on average $20 per document.  How many documents do you process through your staffing department or agency? I think that is worth a second look, don’t you?

If you would like to learn more about these features and others, Signority’s tutorial page is a great resource. And to see how easy it is to have an eSignature Platform work for you I encourage you to take advantage of Signority’s free no obligation two week trial.

If you are considering an eSignature service, let me know what kind of features you’d like to know more about in the comments section below. It just might be my next blog.

Speaking of my next blog, keep an eye out for Basic Security Features You Need in an eSignature Platform, coming next week.

How eSignatures Help Healthcare Staffing

Today I’m going to tell you how eSignatures help healthcare staffing  and the top 5 features needed to reap the rewards.

If you work in healthcare staffing you know that this is one of the most paper intensive areas to work. And to keep that paperwork moving takes a lot of time and effort.

See where eSignatures will have the biggest impact.

Let’s use a typical use case; you’ve hired someone and now you have to send out the hiring package for everyone’s signatures. What are some of the issues you typically run into?

You constantly have to remind someone to sign the documents. The signatures are in the wrong place and there is missing information. Required documents or IDs aren’t attached. Or someone doesn’t receive a final copy so they can do their job.

With an eSignature platform you can automate the process and significantly reduce the issues mentioned above.

Here are the top 5 features that will help you the most.
  1. Automated workflow. This feature allows you to say who to send the document package to and in what order. Each signer receives an email letting them know they have a document to sign. This can happen all at once or in a specific order you determine.
  2. Templates. Templates allow you to save a copy of the form with predetermined signing and information.  A good eSignature platform will offer you a few template formats. Here are some examples of template formats: regular templates, template links, bulk sign templates.
  3. Multi-document package. This means that your document package should be able to consist of multiple separate documents if needed. If there is one thing that will not save you time, it is having to combine all of your documents into one pdf before getting them ready for signing.
  4. Automated email reminders. Have email reminders automatically sent out on a schedule you determine if a signer is taking too long.
  5. Viewer role. This allows you to have the final document package sent to someone who may not be part of the required signings. I.e.: you may need to send a copy to finance to set up their payroll.

Using these five features can save you and your staff time and increase productivity.  But you want to know how much time eSignatures will save you and how much productivity will go up.

Here are just three of the benefits organizations have reported on average from implementing eSignatures, as published by Financesonline.com.

You read that right, companies save on average $20 per document.  How many documents do you process through your staffing department or agency? I think that is worth a second look, don’t you?

If you would like to learn more about these features and others, Signority’s tutorial page is a great resource. And to see how easy it is to have an eSignature Platform work for you I encourage you to take advantage of Signority’s free no obligation two week trial.

If you are considering an eSignature service, let me know what kind of features you’d like to know more about in the comments section below. It just might be my next blog.

Speaking of my next blog, keep an eye out for Basic Security Features You Need in an eSignature Platform, coming next week.

Invest In Our Planet

Invest In Our Planet Earth Day 2022

Invest In Our Planet

Invest in Our Planet is the theme for Earth Day 2022.  Earth Day is held every year on April 22nd and this year marks 52 years since it was first celebrated.

Earth Day was an idea brought to the world by the “Conservation Governor”, former Wisconsin Governor, and then U.S. Senator, Gaylord Nelson (D) back in 1970. The first Earth Day was planned as a ‘Teach In’ to recruit support for environmental policies that would help the earth.

Today Earth Day is one of the ways we invest in our planet. It is a global phenomenon that has record participation and has continued to help and encourage education on everything from conservation, green energy, smart cities, recycling, and green technologies. And with all the investment there has been to date, there is reason to celebrate.

“Invest in the earth by taking steps that help us to reduce our pollution contribution by building in environmental impact into our every day decision-making strategies..”

But as we’ve grown our Green Technology and Sustainability sectors – predicted to reach $51.09 Billion USD by 2029 according to Fortune Business Insight – we’ve also increased our collective carbon footprint as we manufacture and use these great new technologies.  All the new office technologies were supposed to replace paper, printers, fax machines, and photocopiers and yet, somehow it seems like we’ve only increased the use of these technologies as well as our use of paper, ink, travel, mail, and couriers, etc. Let me tell you how Signority did.

Ever since the onset of the company since 2010, you could find our business cards under the fax number as NOT APPLICABLE. We are a  paperless office in our own business and we use AWS as our data centre as it uses green energy. 

Sustainability is one of the five core values of our company.  Signority was created with a mission to be green. After 10 years, we are proud to have saved thousands of trees and reduced over 10 million trips by helping our customers improve productivity and save costs.  

It falls on us to leverage technologies that are more efficient and greener to lower emissions and pollution. And in the end, if we all do just a little more we will make a larger impact than we thought possible. What is your green initiative? How about eSigning your documents and creating a paperless business. You can learn more here about the tools we offer to help companies like yours improve their productivity and use less paper. We even offer a two week free trial.

So please join me in investing in ourselves, our youth, our future, and our planet.

Happy Earth Day.

Invest In Our Planet

Invest in Our Planet is the theme for Earth Day 2022.  Earth Day is held every year on April 22nd and this year marks 52 years since it was first celebrated.

Earth Day was an idea brought to the world by the “Conservation Governor”, former Wisconsin Governor, and then U.S. Senator, Gaylord Nelson (D) back in 1970. The first Earth Day was planned as a ‘Teach In’ to recruit support for environmental policies that would help the earth.

Today Earth Day is one of the ways we invest in our planet. It is a global phenomenon that has record participation and has continued to help and encourage education on everything from conservation, green energy, smart cities, recycling, and green technologies. And with all the investment there has been to date, there is reason to celebrate.

But as we’ve grown our Green Technology and Sustainability sectors – predicted to reach $51.09 Billion USD by 2029 according to Fortune Business Insight – we’ve also increased our collective carbon footprint as we manufacture and use these great new technologies.  All the new office technologies were supposed to replace paper, printers, fax machines, and photocopiers and yet, somehow it seems like we’ve only increased the use of these technologies as well as our use of paper, ink, travel, mail, and couriers, etc. Let me tell you how Signority did.

Ever since the onset of the company since 2010, you could find our business cards under the fax number as NOT APPLICABLE. We are a  paperless office in our own business and we use AWS as our data centre as it uses green energy. 

Sustainability is one of the five core values of our company.  Signority was created with a mission to be green. After 10 years, we are proud to have saved thousands of trees and reduced over 10 million trips by helping our customers improve productivity and save costs.  

It falls on us to leverage technologies that are more efficient and greener to lower emissions and pollution. And in the end, if we all do just a little more we will make a larger impact than we thought possible. What is your green initiative? How about eSigning your documents and creating a paperless business. You can learn more here about the tools we offer to help companies like yours improve their productivity and use less paper. We even offer a two week free trial.

So please join me in investing in ourselves, our youth, our future, and our planet.

Happy Earth Day.

How to Assess Your eSignature Cloud Service Provider’s Security with Confidence

security logo

When looking for an eSignature Cloud Service Provider (CSP), security and privacy are crucial. Your eSignature CSP will likely be helping you manage sensitive information. So, it’s important to choose a provider that you can trust to protect your organization’s and your customer’s data. In this article, we review six things to look for when assessing a CSP’s security and privacy protection.

Industry Security Certifications

The world of data processing is complex, even dangerous. In this age, data drives much of our day-to-day life. Hence, there are malicious actors always trying to steal and ransom data, and compromise data processing systems. Thankfully, many security frameworks like the globally adopted NIST Cyber Security Framework (CSF), have been developed to help keep organizations safe.

There are many security frameworks and standards. In the cloud industry a few important ones include:

  • NIST Cyber Security Framework together with other supporting NIST standards
  • ISO 27001, ISO 27017 and ISO 27018
  • Service Organizational Control (SOC) (1, 2 and 3).

These frameworks contain important security guidelines and controls that help ensure the protection of your data. If your CSP has or leverages one or more of them, it means that your data is likely well-protected.

Note that there are three SOC certifications: SOC 1, SOC 2, and SOC 3. SOC 1 focuses on financial reporting and might not be relevant to your needs. SOC 2 was partially created in response to the rise of cloud computing. In most cases, it will be the most relevant. SOC 2 Type 1 signifies that a CSP has been initially audited and the controls were found to be in place. SOC 2 Type 2 signifies that the CSP has maintained the controls over a period of time. Finally, a SOC 3 report is a more general type of report that’s often used for marketing purposes. It covers much of the same topics as a SOC 2 report, but is simpler and easier to digest.

Legislative and Regulatory Compliance

When it comes to government laws and regulations, things can get complex. Depending on the jurisdiction, the laws and regulations that apply will be different. For eSignature CSPs, privacy protection legislation and electronic signature legislation are legal considerations.

In Canada, one law to keep in mind is the PIPEDA. It stands for “Personal Information Protection and Electronic Documents Act”. As its name suggests, it covers personal information and electronic documents.

With its first part, PIPEDA applies to Canadian private-sector organizations. Specifically, those that collect, use or disclose personal information in commercial activity. Organizations subject to a provincial privacy law that’s substantially similar, are often exempt from PIPEDA. Examples include organizations in British Columbia, Quebec and Alberta. Ontario, New Brunswick, Nova Scotia and Newfoundland and Labrador have also adopted substantially similar legislation. Note that in British Columbia and Nova Scotia, provincial privacy laws require public sector organizations to store and access personal information in Canada only. In the rest of the provinces, Canadian data residency may be encouraged, but isn’t mandatory. Therefore it is very important in these cases to use CSPs that store your data in Canadian data centres. To help assure your customers, you may wish to ensure that your organization’s data remains in Canada regardless. If you are not sure which Canadian laws apply to your organization, this decision tree can help:

https://www.priv.gc.ca/en/report-a-concern/leg_info_201405/

In the United States, there isn’t one set of regulations that governs data privacy protection. Instead, several federal and state laws determine how to handle and protect data. For example, organizations in California may be subject to the California Consumer Privacy Act (CCPA).

Other countries also have their own laws and regulations governing data privacy protection. CSPs with customers in the EU may be subject to privacy regulations from the EU General Data Protection Regulation (GDPR).

The second overall consideration is the legality of electronic signatures. There are a myriad of Canadian federal acts and regulations that address eSignatures. Examples include:

  • PIPEDA, Part 2 (governs private-sector organizations’ use of electronic documents and signatures for purposes required by federal laws)
  • Secure Electronic Signature Regulations
  • Electronic Payments Regulations (annexed to the Financial Administration Act (FAA)
  • Payments and Settlements Requisitioning Regulations (annexed to the FAA)

Besides these, over 20 federal acts and 30 regulations include references to “electronic signature”.

As well, most Canadian provinces and territories have enacted e-commerce and e-transaction laws. These provide electronic equivalents to paper-based signatures, along with other requirements.

In the US, there are numerous related laws including:

  • The US Electronic Signatures in Global and National Commerce Act (E-SIGN)
  • The US Government Paperwork Elimination Act (GPEA)
  • The US Uniform Electronic Transactions Act (UETA). This covers most States, D.C. and the US Virgin Islands.

As well, some FDA-regulated industries may need to be compliant with the Code of Federal Regulations (CFR) Title 21 Part 11. This identifies certain technical eSignature requirements. Some examples of these industries include:

  • US drug makers
  • Medical device manufacturers
  • Biotech companies
  • Biologics developers
  • Contact research organizations (CROs)

There are many other existing and evolving eSignature laws around the world. For example, the EU Regulation No 910/2014. This covers electronic identification and trust services for electronic transactions in the European internal market (eIDAS).

One often misunderstood fact is that laws and regulations don’t have associated technology certification programs. Simply put, there aren’t any third-party audits to check compliance with them. That’s different from the industry security frameworks and standards that discussed above.

Ultimately, it is up to your organization to operate under applicable laws and regulation. Your CSP and its eSignature solution should help you remain compliant with all relevant regulation. But in general, you will still remain responsible and legally accountable.

Third-Party Data Sub-Processing

Third-party evaluated security certifications are a good proxy to test how well a CSP handles an organization’s data. However, sometimes you may wish to go a little deeper. Especially about third-party data sub-processors involved in the provision of an eSignature service.

For example, ask questions about the sub-processors that the CSP uses to process data. What data do they share with them for sub-processing? In which countries are those sub-processors storing that data? Does your CSP hold them accountable to the same high security standards that the CSP uses? Has your CSP provided you details on their sub-processors? Are they certified? Have you agreed to their use, in contract?

Another best practice is to document the types of technical and organizational measures (TOMS) that are expected to be in place. Around the world, this is done using a Data Processing Agreement (DPA). You’ll usually see it as an appendix to the main contract with the CSP.

Security Governance Principles

Having a corporate culture stressing the protection of data and implementation of standard privacy practices is very important for a CSP. Even with security certifications, a CSP always needs to take security and privacy seriously at all levels. Good info security and privacy governance ensures that a company can operate securely. It means they’ve got the right board and executive involvement, leadership, organization, policies, standards, practices, processes, and tools.

To assess a CSP’s information security and privacy governance, here are a couple tips. 1. Check if the CSP’s goals and priorities are linked with security and privacy. 2. Make sure that the CSP has designated senior individuals responsible for overseeing and making security and privacy decisions. Usually this is the Chief Security Officer (CSO) and Chief Privacy Officer (CPO).

Solution Security and Privacy

Your cloud software provider’s product must be designed with security in mind. For cloud solutions, there are several important requirements. For example, using TLS 1.2 or 1.3 certificates to encrypt “data in transit”, and encrypting “data at rest”. It’s also important to know how the service keeps data in customer accounts separate from each other. Qualys is an app that can help you assess how secure a cloud-based application is. An “A” means that the web application is securely built using the latest web protocols. A “C” or “D” indicates seri

Your eSignature CSP’s solution should be designed and maintained with security and privacy in mind. For example: implementing a Development-Security-Operations or “DevSecOps” approach to software development. This helps ensure that security is considered at every stage of the software development life cycle. Another example is using the “Privacy by Design” or PbD principles, practices and approaches. This is a solid way of ensuring privacy considerations at every stage.

One simple check that you can undertake is to test the security of its website. Go to ssllabs.com and input the CSP’s website URL, and then run the test. A score of “A” or higher suggests that the CSP pays attention to security. A score of “B+” or below may suggest otherwise. Under no circumstances these days should a CSP be permitting the use of older SSL, or weak TLS 1.0 and 1.1. Nor should it be permitting the use of weak browsers, protocols or ciphers.

Also check the CSP’s website for a comprehensive Privacy Policy or Privacy Statement. The policy should explain the CSP’s privacy practices in detail and kept current; less than one year old. It should also provide you with relevant contact info (e.g. Chief Privacy Officer). This is important if you have any questions. You should also be able to find government privacy legislation contact info. In case you want to file a complaint, that is where you would send it.

Solution Security Features

An eSignature CSP solution should support your privacy and security needs. This is especially true if you’re handling sensitive information. So, you’ll want to look for solution features that help you control and protect that information. For example, look for strong password dynamics and standardized multi-factor authentication methods. Ideally they should be available for both the creators and signers of your documents. Also look for SAML 2.0 capability so you can use your own organizational electronic identifies and related security policies.

Also, ensure that you will have the ability to use more secure ones eSignature options. For example, those that involve the use of public-key infrastructure (PKI) and notarization services. These are often called “digital” signatures.

You will also want to look for granular security roles and the ability to restrict certain documents to a few individuals. Make sure to clarify and ask questions!

Contract Signing in HR Using eSignatures

When managing people and employees, there’s always a lot of paperwork involved. New employees need to sign contracts, contractors need to sign agreements, and every year staff might need to sign acknowledgement forms. If you’re managing a large number of employees, all the paperwork can pile up. It takes a huge effort to sort everything out and make sure that all the forms are in place. Not to mention the mistakes that people make when filling out a form. It could be missing a mandatory field, or filling something in with the wrong type of information. Mistakes like these just make life harder for everyone. That’s where an eSignature tool like Signority comes into play.

Standard Forms/Contracts

For standard forms or contracts that don’t change regardless of who is signing the contract, a feature like the Signority eSignature Template is what you’re looking for. By setting up a form as a template, you’ll be able to instantly access and send the form to anybody who needs to sign. If there are multiple administrators in your organization who also need to use the form, you can set up the form as a template once, then share it with everyone who needs to use it. Just make sure that all your coworkers are in the same eSignature account team as you are.

The great thing about a feature like Signority’s eSignature Template is that you can set up a custom workflow for each of your forms. For example, let’s say you have a contractor work agreement form. For this form, you need to have the contractor sign first, and then have an authorized representative from your company sign. You can set this workflow up in the Regular Template by adding two recipients, and then assigning an order for them. This way, you can easily set up any contract signing process as an eSignature Template.

Acknowledgement Forms

Sometimes a form needs to be sent to hundreds or thousands of employees at the same time. An example of this might be a policy acknowledgement form that all staff need to sign. In this case, a feature like the Signority Bulk Sign feature is the thing to use. A bulk signing feature can save your organization hours or even days of work. You can electronically send hundreds of copies of forms at once just by uploading a list of recipient names and emails to your eSignature application. Reporting features also allow you to manage all the forms sent out in one place. You can instantly search for who has yet to sign the document, and even see what each person has inputted into the form.

Signority’s Bulk Sign feature also allows you to build custom workflows for your form, just like any other eSignature document.

Save time by reducing errors

With an eSignature tool, you’ll be able to mark certain fields as “Mandatory” and others as “Optional”. Since the signing process happens on the eSignature app, the app will be able to enforce these mandatory fields. That means that your signer won’t be able to send back the document to you without filling in these fields.

eSignature tools also offer different types of fields, such as text fields, number fields, dropdown menus, radio buttons, and more, to ensure that the recipient is inputting the right type of information. The last thing you want is for your signer to put in their name where their phone number is supposed to be.

Using these features, you’ll drastically cut down on the amount of time both you and your recipient spend on signing a contract. No more going back and forth trying to get forms completely properly.

Customer Acquisition Online with LinkSign

The Signority LinkSign feature lends itself to many different use cases. In this article, we’ll focus on one of those use cases: Customer Acquisition. Customer acquisition is a key part of any business and making it effective and efficient can make a huge difference to your business’ success.

Types of forms can LinkSign be used for

Basically any standard form that needs to be signed by an individual can be set up using LinkSign. Any forms that you might want to post on your website for visitors to view and sign if they are interested in your services will work great using LinkSign. These kinds of forms can include questionnaires, insurance applications, engagement letters, etc.

How it works

At a high level, LinkSign works by generating a URL for a form that you create. The steps to create a LinkSign form are relatively simple.

  1. Sign into your Signority account
  2. Create a new LinkSign form by clicking “New Template” from your dashboard, then choosing the “LinkSign” option
  3. Now upload the file for your form
  4. Drag and drop the appropriate fields onto the document. These are the fields that people will be filling out and using to sign.
  5. Publish the LinkSign and copy the generated URL. You can use this URL to send to individuals or post it on your website for visitors.

Benefits

For many businesses, the customer acquisition process requires the potential customer to sign a form or document before becoming an actual client. If you’re not using an eSignature tool like Signority’s LinkSign feature, that means that people need to print, sign, scan and send the form back to you. It’s a time-consuming process that could be costing your business a significant number of new clients. With LinkSign, signing takes just a few minutes. In addition, you can track each person’s progress in real time as they fill out their forms and view a report of everyone who has already filled out your form.

Signority’s LinkSign functionality doesn’t stop there. Using built-in routing features, you can have every completed form automatically sent to your sales department for approval. If anybody needs to see or sign the form after a potential client completes it, you can set up the LinkSign to route that document to them. Any such workflow can be customized.

To recap, the traditional customer acquisition process can be slow especially when there’s signing involved. Signority’s LinkSign feature gets rid of that problem by enabling fast and easy online form signing, with the added perks of tracking and reporting features for your business.

11 Essential Resources For Your New Paperless Office

11-resources-for-taking-you-business-paperless-esignatures-digital-signatures-electronic

Starting a digital office can seem a daunting task. You want to go in and go all the way – but what if you overlook a key aspect and everything stops working together? Not to worry. Here’s the list of resources you will need to utilize in your new paperless office. With nothing missing. Well, expect the paper.

PAPERLESS INVOICING

Freshbooks is a great service that can convert your billing and invoicing system to a secure electronic database. This “cloud accounting” service delivers a fast, accurate, easy to use, and professional interface for all your billing needs. Automated invoicing is available, as is integrations with Paypal and other online payment services. Use the system to generate reports, track expenses – even get the app to ride along.

PAPERLESS MEETINGS

TeamViewer lets you conduct paperless meetings and manage data within the paperless. You get remote access to any device 24/7 from any computer or mobile device. Hijack your colleagues’ laptops to access data during meetings, plus use screen sharing, video and file sharing, included whiteboards, and teleconferencing to be effective and paperless. When meetings are over, upload slides and info to Dropbox or Basecamp easily and share the digital copies.

Doodle and SurveyMonkey provide free service for conducting and scheduling meetings but don’t provide device connectivity and takeover capabilities.

PAPERLESS SCANNING AND FAXING

Turboscan is an excellent app that allows phone cameras to be used as scanners which then convert captured images to PDFs. High-quality photos are editable and may be stored and sent singularly or as large files.

Your office may also need a larger scanner for digital imaging. Here’s a PC World review of the best scanners for a paperless office.
eFax takes incoming faxes and puts them into your email box and easily-searchable emails. Receive and send faxes online from any smartphone, tablet, or computer.

PAPERLESS MEMOS AND NOTES

Evernote lets you organize notebooks of digital notes, tasks, and can sync all your devices. Whether you use a laptop or an Android phone, you can have all your notes and thoughts wherever you go. Circulate ideas between team members

PAPERLESS PAYMENTS

Square and Paypal Zettle let you process credit cards from the convenience of any mobile device and send paperless receipts to customers.

Shoeboxed lets you send your mass of paper receipts into the Shoeboxed office and receive digital versions in return. They’ll scan your papers and index them in your account, letting you get reports and integrate the data into your database systems.

PAPERLESS SIGNATURES

Signority streamlines the essential process of acquiring customer signatures with one seamless digital application. Send and receive signed documents via a user-friendly interface usable across any device. Need help on how to create an electronic signature document in Signority? No problem! Check out our Knowledge Base, or contact our customer support. Signority is great for the all agile businesses, allowing you to sign PDFs instantly, edit and store documents with one touch, and move forward faster.

Looking to take your business paperless? Sign-up now and get a 14-day free trial to a Signority Plan!