Lūdzu atjauniniet savu pārlūkprogrammu
Jūsu Tīmekļa pārlūks nespēj pilnvērtīgi attēlot šo lapu, jo šī lapa ir būvēta balstoties uz moderniem Tīmekļa standartiem. Lai apskatītu šo lapu, aicinām Jūs izvēlēties kādu no modernajiem Tīmekļa pārlūkiem, kas pieejami zemāk.
Bezmaksas pārlūkprogrammas - visas pārlūkprogrammas nodrošina vienādas pamatfunkcijas un ir viegli lietojamas. Izvēlieties, kuru pārlūkprogrammu vēlaties lejupielādēt:
This document outlines the security technologies, policies, and practices that protect your documents and data within our eSignature, including information that enables you to configure security in accordance with the specific risk management and compliance requirements of your organization.
We maintain around-the-clock onsite security with strict physical access control that complies with industry-recognized standards, such as SOC 1, SOC 2, and ISO 27001.
We also use world-class security software and hardware to protect the physical integrity of eSignature and all associated computer systems and networks that process customer data. We do this through a centralized management system that controls access to the production environment through a global two-factor authentication process.
This isolated production environment is protected by industry-leading network management systems, anti-virus software, and malware detectors. The anti-virus software is integrated with processes that automatically generate alerts to cyber incident response team if potentially harmful code is detected.
Please fill out this form to be contacted by a Sales Representative.