Security

Security is more than just creating a secure application - it involves constant monitoring, improving and staying vigilant against all risks.

The security of the information you put into Docu Signer is very important to us and we take this responsibility very seriously. We focus on keeping content secure at all steps in the application rather than simply at edge points. We use physical, technical and procedural safeguards to preserve the integrity and security of your information. Here are some of the measures we take to prevent data leaks and unauthorized data access:


Physical security

All of Docu Signer’s servers are hosted in secure, SAS 70 audited data centers.


Defense in Depth multi-level data security

We use a series of defensive mechanisms that are layered in order to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors.


Secure application development

Docu Signer follows best practices in all areas of application security and prevents common web attack vectors. When you enter information into Docu Signer, we use secure socket layer (SSL) technology to encrypt the transmission of your data to our servers, which helps protect your data.


Network security

All servers are firewalled to permit the minimum traffic necessary to run the service, and access to those servers is limited to Docu Signer employees with a legitimate business need.


Data reliability

Docu Signer continuously replicates your data between physical locations to prevent data loss. Additionally, Docu Signer stores regular backups and has the ability to perform point-in-time recovery for more granular data recovery. Docu Signer uses Amazon and Azure servers to manage all user data. These servers provide us with the ability to do point-in-time recovery of our entire data


Vulnerability scans

Docu Signer performs weekly internal vulnerability inspection at all potential points to identify security holes.


Security audits

Annual third party SOC 2 security audits by third party to ensure security of your data.

Icon