Compliance & Security
Our commitment to security, privacy, and regulatory compliance
1. Security Certifications
SOC 2 Type II
Independently audited for security, availability, processing integrity, confidentiality, and privacy controls.
ISO 27001
International standard for information security management systems and best practices.
2. Legal Compliance
Electronic Signature Laws
- ESIGN Act: Electronic Signatures in Global and National Commerce Act compliance
- UETA: Uniform Electronic Transactions Act compliance
- eIDAS: European Union electronic identification and trust services regulation
- Global Standards: Compliance with electronic signature laws in 190+ countries
Data Protection Regulations
- GDPR: General Data Protection Regulation (EU)
- CCPA: California Consumer Privacy Act
- PIPEDA: Personal Information Protection and Electronic Documents Act (Canada)
- LGPD: Lei Geral de Proteção de Dados (Brazil)
Industry Regulations
- HIPAA: Health Insurance Portability and Accountability Act
- FERPA: Family Educational Rights and Privacy Act
- GLBA: Gramm-Leach-Bliley Act (Financial Services)
- 21 CFR Part 11: FDA regulations for electronic records
3. Data Security Measures
Encryption
- AES-256 encryption for data at rest
- TLS 1.3 encryption for data in transit
- End-to-end encryption for sensitive documents
- Hardware security modules (HSMs) for key management
Access Controls
- Multi-factor authentication (MFA) required
- Role-based access control (RBAC)
- Single sign-on (SSO) integration
- Regular access reviews and deprovisioning
Infrastructure Security
- AWS/Azure cloud infrastructure with security best practices
- Network segmentation and firewalls
- Intrusion detection and prevention systems
- 24/7 security monitoring and incident response
4. Audit Trail and Evidence
SignSpark maintains comprehensive audit trails for all document activities:
- Detailed timestamp records for all actions
- IP address and device information logging
- Digital certificates and cryptographic proof
- Tamper-evident sealing of completed documents
- Long-term evidence preservation (10+ years)
5. Business Continuity
- 99.9% Uptime SLA: Guaranteed service availability
- Disaster Recovery: Multi-region backup and failover capabilities
- Data Backup: Automated daily backups with point-in-time recovery
- Incident Response: 24/7 monitoring and rapid response procedures
6. Third-Party Assessments
We undergo regular third-party security assessments:
- Annual SOC 2 Type II audits by certified public accountants
- Quarterly penetration testing by security firms
- Vulnerability assessments and code reviews
- Compliance audits for industry-specific regulations
7. Employee Security Training
All SignSpark employees undergo comprehensive security training:
- Security awareness training upon hiring
- Regular phishing simulation exercises
- Data handling and privacy training
- Incident response procedures
- Background checks for all personnel
8. Vendor Management
We carefully vet and monitor all third-party vendors:
- Security assessments before vendor onboarding
- Contractual security and privacy requirements
- Regular vendor security reviews
- Data processing agreements (DPAs) with all vendors
9. Contact Our Security Team
For security-related inquiries or to report vulnerabilities:
SignSpark Security Team
Email: contact@signspark.net
Bug Bounty: security-bounty@signspark.net
Address: 2443 Fillmore Street, Suite 380, San Francisco, CA 94115