Compliance & Security

Our commitment to security, privacy, and regulatory compliance

1. Security Certifications

SOC 2 Type II

Independently audited for security, availability, processing integrity, confidentiality, and privacy controls.

ISO 27001

International standard for information security management systems and best practices.

2. Legal Compliance

Electronic Signature Laws

  • ESIGN Act: Electronic Signatures in Global and National Commerce Act compliance
  • UETA: Uniform Electronic Transactions Act compliance
  • eIDAS: European Union electronic identification and trust services regulation
  • Global Standards: Compliance with electronic signature laws in 190+ countries

Data Protection Regulations

  • GDPR: General Data Protection Regulation (EU)
  • CCPA: California Consumer Privacy Act
  • PIPEDA: Personal Information Protection and Electronic Documents Act (Canada)
  • LGPD: Lei Geral de Proteção de Dados (Brazil)

Industry Regulations

  • HIPAA: Health Insurance Portability and Accountability Act
  • FERPA: Family Educational Rights and Privacy Act
  • GLBA: Gramm-Leach-Bliley Act (Financial Services)
  • 21 CFR Part 11: FDA regulations for electronic records

3. Data Security Measures

Encryption

  • AES-256 encryption for data at rest
  • TLS 1.3 encryption for data in transit
  • End-to-end encryption for sensitive documents
  • Hardware security modules (HSMs) for key management

Access Controls

  • Multi-factor authentication (MFA) required
  • Role-based access control (RBAC)
  • Single sign-on (SSO) integration
  • Regular access reviews and deprovisioning

Infrastructure Security

  • AWS/Azure cloud infrastructure with security best practices
  • Network segmentation and firewalls
  • Intrusion detection and prevention systems
  • 24/7 security monitoring and incident response

4. Audit Trail and Evidence

SignSpark maintains comprehensive audit trails for all document activities:

  • Detailed timestamp records for all actions
  • IP address and device information logging
  • Digital certificates and cryptographic proof
  • Tamper-evident sealing of completed documents
  • Long-term evidence preservation (10+ years)

5. Business Continuity

  • 99.9% Uptime SLA: Guaranteed service availability
  • Disaster Recovery: Multi-region backup and failover capabilities
  • Data Backup: Automated daily backups with point-in-time recovery
  • Incident Response: 24/7 monitoring and rapid response procedures

6. Third-Party Assessments

We undergo regular third-party security assessments:

  • Annual SOC 2 Type II audits by certified public accountants
  • Quarterly penetration testing by security firms
  • Vulnerability assessments and code reviews
  • Compliance audits for industry-specific regulations

7. Employee Security Training

All SignSpark employees undergo comprehensive security training:

  • Security awareness training upon hiring
  • Regular phishing simulation exercises
  • Data handling and privacy training
  • Incident response procedures
  • Background checks for all personnel

8. Vendor Management

We carefully vet and monitor all third-party vendors:

  • Security assessments before vendor onboarding
  • Contractual security and privacy requirements
  • Regular vendor security reviews
  • Data processing agreements (DPAs) with all vendors

9. Contact Our Security Team

For security-related inquiries or to report vulnerabilities:

SignSpark Security Team

Email: contact@signspark.net

Bug Bounty: security-bounty@signspark.net

Address: 2443 Fillmore Street, Suite 380, San Francisco, CA 94115