Lūdzu atjauniniet savu pārlūkprogrammu

Jūsu Tīmekļa pārlūks nespēj pilnvērtīgi attēlot šo lapu, jo šī lapa ir būvēta balstoties uz moderniem Tīmekļa standartiem. Lai apskatītu šo lapu, aicinām Jūs izvēlēties kādu no modernajiem Tīmekļa pārlūkiem, kas pieejami zemāk.

Bezmaksas pārlūkprogrammas - visas pārlūkprogrammas nodrošina vienādas pamatfunkcijas un ir viegli lietojamas. Izvēlieties, kuru pārlūkprogrammu vēlaties lejupielādēt:

Security

eSignature complies with the U.S. ESIGN Act and UETA, as well as
the EU eIDAS
Regulation.

Security is in our DNA, and like all of our products, eSignature is researched, designed, and developed with security as a top priority.

This document outlines the security technologies, policies, and practices that protect your documents and data within our eSignature, including information that enables you to configure security in accordance with the specific risk management and compliance requirements of your organization. 

ESign compliant ESign compliant ESign compliant               

We maintain around-the-clock onsite security with strict physical access control that complies with industry-recognized standards, such as SOC 1, SOC 2, and ISO 27001.                    

We also use world-class security software and hardware to protect the physical integrity of eSignature and all associated computer systems and networks that process customer data. We do this through a centralized management system that controls access to the production environment through a global two-factor authentication process.

This isolated production environment is protected by industry-leading network management systems, anti-virus software, and malware detectors. The anti-virus software is integrated with processes that automatically generate alerts to cyber incident response team if potentially harmful code is detected.                

Contact our sales team

Please fill out this form to be contacted by a Sales Representative.