In the age of digital transformation, companies are scrambling to find a balance between providing delightful transactions for users and maintaining strong legal and security measures should those transactions ever become the subject of a court case.
By outsourcing eSignature collection to a software platform that provides detailed audit trails, thorough authentication, and diligent compliance protocols we’ll explore today; organizations will be able to maximize the legality and security of their online transactions without putting the burden of exhausting, complex workflows on their customers or employees.
Are eSignatures Really Legal?
Let’s start with the basics—documents signed electronically have the same legal recognition as those signed with a good ol’ pen.
Much of this is thanks to the Electronic Signatures in Global and National Commerce (E-SIGN) Act, which was enacted in the U.S. in 2000. The E-SIGN Act basically says that agreements, contracts, transactions, and other documents that are signed electronically shouldn’t be denied legality just because they don’t exist on paper.
To learn more about eSignature security, be sure to visit Dropbox Sign’s Trust Center.
4 Ways to Maximum Legality and Security Using eSignature Software
Whether you choose to build your own eSignature platform (you must have an impressive tech team!) or partner with a provider that specializes in eSignature software (BTW, Dropbox Sign has been named the easiest eSignature tool to implement for several years in a row), it’s critical that you use a solution with strong legality and security measures to protect your most valuable clients and transactions.
At Dropbox Sign, all your communications are safeguarded by Transport Layer Security (TLS) encryption. Each document is stored behind a firewall and authenticated against the sender’s session every time it’s requested. Documents are also encrypted with a unique key—each of which is in turn encrypted with a regularly rotated master key. So even if someone were able to bypass physical security, they still wouldn’t be able to decrypt your data.
Speaking of physical security, we store our data in a SOC 1 Type II, SOC 2 Type I, and ISO 27001 certified data center. Access to the data center is strictly controlled by security staff equipped with video surveillance, multi-step authentication, and state-of-the-art intrusion detection systems.
Detailed Audit Trails
Audit trails ensure that actions on an electronic document are thoroughly tracked and time-stamped and can help you tell if it was ever modified or tampered with without your knowledge.
Dropbox Sign creates a comprehensive, non-editable transaction trail between signing parties to make sure every eSignature and digital document has an audit trail.
To provide you with a transaction history, we track and timestamp various information—including IP and UserAgent info—from the moment the document is submitted for signature to when it is signed and completed. To help ensure that any tampering of your transaction log is detectable, we process each transaction with hashing technology. This provides a “copy” of every version of the document which you can use for comparison should a questionable version ever come to light.
These are all the events Dropbox Sign’s eSignature software tracks to create detailed audit trails:
Combine detailed audit trails with authentication (which we’ll discuss next!) and you’re prepared to provide a record of every time someone accessed, reviewed, and signed a document.
To maximize legality and security, it’s important that your eSignature platform takes major steps toward verifying that a user is who they say they are before they’re allowed to execute a signature or even access a document.
Most commonly, capturing their IP address and proving a person had access to a specific email account and/or phone number is enough to connect them to the computer and software that was used when the eSignature was created.
When using Dropbox Sign, any person signing a document must either have login information for Dropbox Sign or have received a request for signature via email. To ensure no one is able to access a Dropbox Sign user account without permission to sign or send documents fraudulently, all user information including usernames and passwords are encrypted. We also seek to prevent others from accessing or using your account by timing-out sessions and emailing you every time a contract is sent to, received by, or signed by your account.
In addition, we allow users to set up two-factor authentication which requires the entry of a unique code sent to a mobile device along with their username and password. Users can also enable a 4 to 12 digit code that signers must enter to view or sign a document. All of the authentication data that a user provides to Dropbox Sign is encrypted and passwords are hashed and salted with an adaptive hashing algorithm.
Diligent Compliance Measures
Failing to adhere to pertinent compliance regulations can result in repercussions ranging from costly fines to prosecution and even jail time. Why risk the security—or the revenue and the future—of your business on less-than-diligent information security standards?
At Dropbox Sign, we protect our clients by building in processes that make sure our eSignature platform complies with the standards that may govern your business.
Dropbox Sign is compliant with:
- SOC 2 Type II
- ISO 27001 и ISO 27018
- The U.S. E-SIGN act of 2000
- Единый закон об электронных сделках (UETA) 1999 года
- The new eIDAS regulation for the EU of 2016 (EU Regulation 910/2014), which replaces the former European EC/1999/93 Directive
- Программа Privacy Shield
- General Data Protection Regulation (GDPR)
Связаться с нами and we’ll help you determine if Dropbox Sign is the right eSignature platform for your security and legality needs.
Balance Legality, Security, and User Experience with Dropbox Sign
At Dropbox Sign, we’re dedicated to helping organizations discover an eSignature solution that provides ease-of-use and exceptional security. Usability is important to your customers—but taking careful security, audit, authentication, and compliance measures is important to you and the legality of the business you conduct online.
The good news is, you don’t have to choose between usability, security, or legality anymore. Balance a delightful user experience with extra-strength legal and security features when you team up with Dropbox Sign—a powerful, award-winning platform that caters to everyone from small businesses to enterprise organizations.
DISCLAIMER: The information on this site is for general information purposes only and is not intended to serve as legal advice. If you have legal questions please consult with your attorney.
What’s a Rich Text element?
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.
Static and dynamic content editing
A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!
How to customize formatting for each rich text
Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.