Vendor Questions. esignatures Request for information InsureSign
|
|
- Madison Brown
- 8 years ago
- Views:
Transcription
1 InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing Ceremony 1.1 Describe your solution s signing ceremony (how does the signing process work, including authentication, signing the document, and delivery of the document). 2. Consent 2.1 How does the solution prove that consent to use electronic means for both signatures and ongoing delivery of information was provided by the user? 2.2 How does the user indicate acceptance (i.e., click a button, provide a signature, etc.) 3. In Writing 3.1 How does your solution provide access to documents? The signer receives an (or text message) with a link to sign the document. If a password has been selected, they enter it. They are presented with a signing page where they review and sign the document. They may then receive a copy via , or a link to create an account and then retrieve it. There is a required checkbox and verbiage that shows that by checking the box they agree. Checkbox (above) They normally receive a copy via , and a copy is available in their cloud account also. 3.2 How will documents be stored? They are stored in geographically diverse, secured data centers, automatically backed up to different centers. 3.3 In what form will documents be stored? They are stored as digitally signed PDFs.
2 3.4 Are the servers located in Canada? No, US. Documents can be automatically sent via after completion to a Canadian cloud storage provider if desired. Most cloud providers offer this storage option. 3.5 How is access to a document determined/permitted? 3.6 When will access be granted to each contracting party and for how long? Only senders and signers are allowed access. There is also the option for the sender to set a CC recipient as well. Access is currently unlimited as long as they have an active account. Of course, they can keep the PDF copy they receive however they like. 3.7 Access to the documents if user Once the account is cancelled, the documents can be verified via a wants to change providers/no longer uses provider? document code, but online access stops. They would need to use locally stored documents. The document code is a unique code with a URL to a page with the verification that the document is valid and was signed. The audit page (without document data) can also be accessed. 3.8 Backup/disaster recovery plans? All data centers are fully redundant with full disaster backup plans. 4. Original Copy 4.1 Will each contracting party (including any assignee) be able to access, retain, use, print and store a copy of the documents? 4.2 How is document integrity assured? A digital certificate is applied to each completed document, and a complete audit trail is included in the document How does your solution prevent changes to the document content that may occur on communication, storage and display? Digital certificate (above)
3 4.2.2 Can the document (look/file type/content) be altered during its lifecycle? Who will have the ability to do so? What security measures prevent unauthorized modification? How are changes to the document tracked through its lifecycle? Will there exist a single authoritative copy of the electronic document that is unique, identifiable and unalterable? Can this authoritative copy identify assigned parties as the owner or secured party with a security interest therein? How can the authoritative copy be distinguished from other copies? No (see above) n/a Digital signing above Complete audit trail yes, all parties to the document Digital certificate How does the authoritative copy mark changes as authorized or unauthorized? See above Who owns the final document? The sender and signer both receive copies
4 5. Contract Formation / Electronic Form 6. Timing and Receipt of Electronic Document 7. Electronic Signature Is it possible for the electronic vendor to sell, provide or otherwise use such electronic document without the owner s consent? 5.1 What opportunities will the contracting parties be given to review the contract before submitting? 5.2 If a mistake is found, how can it be fixed prior to submitting? 5.3 Does the solution have notification procedures that allow contracting parties to contact each other and/or your company so that an error can be fixed? 5.4 Does the solution allow the publisher to impose an expiration date on the document, after which it will no longer allow recipients to sign? 6.1 How does the any contracting party or assignee become aware when documents have been sent / viewed / signed / finalized? When it is not delivered? 7.1 How will the digital signatures applied by parties to the contract meet the definition of an electronic signature? How does your solution generate electronic signatures? (i.e., what standards are used as part of the No, against terms of use The full document is presented and is scrollable and zoomable The document would have to be cancelled, with an explanation back to the sender. Then resent. Via the cancellation procedure, notes can be attached. s can be configured to be sent during these events, and the desktop component can also display alerts. They are PDF-standard digital signatures, with a trusted authority (Adobe) Adobe in-house Document Cloud standards
5 process?) How is the electronic signature linked with the document? 7.2 Is your solution flexible with regards to technological advances and future legal requirements concerning electronic signatures as they arise? 7.3 How may a contracting party provide a signature (e.g., scribe, click, etc.) 7.4 Does your solution support multiple signatures within the same document from multiple parties? 8. Authentication 8.1 How can it be proven that the documents are contracts entered into by the contracting parties (e.g., , SMS, etc.)? How and where is the proof thereof stored? How can it be accessed and by whom (e.g., contracting parties, assignees, etc.)? 8.2 What safeguards are in place to verify the identity of the contracting parties? There is a link in the signature to the audit page online. Also, it is graphically represented and detailed in the audit trail attached., easily adaptable to future changes in legal requirements. They can type a signature, draw a signature, or upload a scanned image if they have an account with us., multiple signers, as well as the sender s signature. verification is the primary method, but passwords may be set for opening and signing the document. SMS verification is also offered. It is stored in our backend system, but is detailed in the attached, digitally certified audit trail as well. Each of the parties and cc s can access it. See above.
6 9. Electronic Evidence 8.3 Can recipients of an electronic document forward signature requests to others? How is authentication maintained? 8.4 What is the workflow for maintaining authentication when signing in person? 9.1 How will the integrity of your solution be provable? What mechanisms are in place to track system operations and downtime? What are the system maintenance practices? What information is backed up and what is the disaster recovery plan? Currently, we do not allow signers to forward requests for signature. The document is protected by a combination of name and password to access the signing screen. Our solution runs on Adobe Document Cloud, and is consistent with their normal procedures. There is a publicly available downtime tracker. All data is kept in multiple, geographically diverse data centers that are continually monitored and updated. All information including the data table of transactions/documents What system security measures are in place? Who will have control over the documents? All data centers are protected with advanced hardware security and also physically protected with limited access and armed guards. Adobe and InsureSign, and the sender and signer will have access Is there any reason to doubt the integrity of the system? No
7 9.2 Will the electronic signatures of your solution meet the federal legislative requirements for a secure electronic signature? Will the prescribed process be followed? If not, detail any variations How will signature certificates be validated? How is it known if the certificate has expired or been revoked? Will signature certificates be supported by other signature certificates? Who is the certification authority? Have they passed the vetting process of the Treasury Board? How does an individual receive public and private keys? What controls are there on receiving public and private keys? What controls are there on issuing public and private keys? The certificate will be issued by a trusted root certificate authority Built-in to Adobe Acrobat and in the PDF specification The root certificate will be attached to the PDF Adobe / yes We do not issue the public/private keys in our web-based solution See See 9.2.6
8 9.2.9 Do you use a hash algorithm to create a message digest? If so, describe. 9.3 What support do you provide to clients in the event of a legal dispute?, internally Complete audit trail and certificate authority details 10. Audit Trail 10.1 What is included in the audit trail? Creation, sending, password validation, and signing details. Also, any declines/cancels 10.2 Where is the audit trail for the document stored, and how may it be accessed by contracting parties? 10.3 Does your solution have the ability to reproduce the transaction from start to finish? 10.4 How is electronic evidence provided to a third party (e.g., courts) in the event of a dispute? 10.5 Does your solution conform to legislated evidentiary requirements (e.g., Canadian General Standards Board s Electronic Records as Documentary Evidence CAN/CGSB )? 11. Privacy 11.1 How will the privacy of contractors and their personal information be assured? (e.g., PIPEDA compliance, etc.) It is stored in our internal data structure, and also appended to each document yes Case-by-case basis, but most exists right in the document. A data export can also be arranged. Our platform conforms with the Canadian Uniform Electronic Commerce Act (UECA) Password security on accounts, encryption on retained data
9 What information is stored by the system? All information needed to produce the audit trail, and also pre- and post-signing documents Where is it stored? Geographically diverse data centers in the US Who has access to the information? What security procedures exist? What is the information used for and by whom is it used? How long is the information stored? In what form is the information stored? Contract participants, and tier 2 technicians Physical and network hardware security is extensive Outside the contracting parties, information would only be accessed to diagnose a problem or in the event of a dispute Indefinitely Electronic data structure and PDF
10 2. End-User Functionality Questionnaire This section corresponds to the operational aspects of your esignature solution. # Functionality Items Questions Responses 1. Field Overlay 1.1 Can a signature field be overlaid on top of a form? 1.2 Does your solution support multiple signatures within the same document from multiple parties? 1.3 Can additional fields be overlaid on top of a form? 2. Document Management 2.1 How are the documents organized from a broker's point of view? The broker/sender can send as many documents to the software as they like. We assemble them all as thumbnails prior to sending. 2.2 Does your solution support multiple signed documents as a single transaction? 2.3 What is the size limit per document? No limit 2.4 What document formats are supported? Any document that can be printed can be sent (Word, PDF, Excel, HTML, etc.) 2.5 Can customers attach supplemental documents with the document to be signed? by simply printing them in Documents can be printed utilizing the InsureSign virtual printer component, which installs like a real printer, showing up on the
11 # Functionality Items Questions Responses 3. Broker Management System (BMS) Integration 4. Compatibility 3.1 Are there APIs available to provide the ability for your solution to integrate with third-party applications such as Broker Management Systems (BMS)? 3.2 How are finalized documents transferred to a BMS (e.g., manual, FTP, etc.) 4.1 What web browsers does your solution support? 4.2 What operating systems does your solution support? 4.3 Will users have to install software to sign documents? 4.4 Is your solution compatible with the Citrix environment? printer list, only with no hardward involved. Any document(s) printed to this printer will show up in InsureSign, ready for sending to the signer. There are several methods available manual, , HTTP PUT, API connection All modern browsers All No 5. Mobile 5.1 Are customers able to sign using mobile devices (tablets / smartphones)? If so, what does it look like from an enduser perspective? 6. User-Friendly 6.1 Are contracting parties able to partially complete the signing process and finish at a later time? How is there is a mobile-specific interface All mobile devices are supported by our universal signing interface. Not currently, but in an upcoming version
12 # Functionality Items Questions Responses security/authentication maintained? 7. Admin Account 7.1 Is there an admin account that has the ability to monitor/control other user privileges? 8. Reporting Tools 8.1 Are there any reporting features? 8.2 Are the reports out of the box? Can they be customized?, can be customized and automated 9. Branding 9.1 How can customers customize and brand the documents they wish to have signed? 9.2 Can users customize s sent by your solution? 10. Reliability 10.1 Has your solution been involved in any security or legal disputes within the past five years? If so, describe. Logos and footers can be customized, as well as the body of the sent to signers See above No
13 3. Services and Pricing Questionnaire This section corresponds to the customer support and pricing models of your solution. # Services and Pricing Items Questions Responses 1. Technical Support 1.1 Is there a help line for customer issues/questions with the solution? shown right on our website 2. Versions / Pricing Model 2.1 What different versions does the software include? Only one version of software, different pricing is annual vs monthly and also depends on user seats 2.2 What deployment options (i.e., cloud, behind firewall, etc.) are available? Several web-based, desktop-based within local network, terminal server/citrix 2.2 What is the pricing model? Priced per user-seat, discount for annual billing. Free 30-day unlimited trial. Unlimited signers and documents on all plans.
Vendor Questions. esignatures Request for information - RightSignature
Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing Ceremony
More informationHOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW
HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationSecurity Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationCoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
More informationDigital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
More informationdobe Acrobat XI Pro Digital Signatures
dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this
More informationELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
More informationGovDelivery Email Subscription Management System
Privacy Impact Assessment for the GovDelivery Email Subscription Management System March 7, 2008 Contact Point Tina Kelley Internet Services Office E-Gov Services Staff 202-616-0992 Reviewing Official
More informationAutomation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
More informationAdobe Digital Signatures in Adobe Acrobat X Pro
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
More informationAdobe Developer Workshop Series
Adobe Developer Workshop Series Working with Security February 2005 San Francisco, California 2005 Adobe Systems Incorporated. All Rights Reserved. Agenda Introduction Overview of Intelligent Document
More informationLegalesign Service Definition Electronic signature and contract management service
Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationInternet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
More informationFilestor Digital Asset Management. The way it works
Filestor Digital Asset Management The way it works Filestor is an Advanced Digital Asset Management System Filestor is far more than a Digital Asset Management System as it has been designed to be flexible
More informationCreating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
More informationUser Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
More informationInside Electronic Signature APIs
Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider
More informationFormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
More informationLegal IT 4.0 Electronic Signatures Monday, April 26, 2010
Legal IT 4.0 Electronic Signatures Monday, April 26, 2010 Michael Laurie, Vice-President & Co-founder Silanis Technology Inc., 2008 All Rights Reserved About Silanis Experience Shaping the industry since
More informationKnowledge based authentication (KBA)
Knowledge based authentication (KBA) Overview Knowledge based authentication (KBA) is an advanced identity validation method to authenticate a signer by asking random questions selected from public and
More informationMoving Towards an Electronic Real Estate Transaction
Moving Towards an Electronic Real Estate Transaction The Electronic Signature Legal Overview (U.S.) August 2010 1 Introduction Every real estate transaction involves the parties to the transaction putting
More informationInfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with
More informationMeeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
More informationManaged Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationA unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
More informationGlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4
GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING
More informationEnterprise SSL FEATURES & BENEFITS
Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal
More informationData Storage That Looks at Business the Way You Do. Up. cloud
Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
More informationIMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT DATA PRESERVATION EXPLANATORY NOTES : The preservation of information
More informationSecure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
More informationCCH esign. Quick Start Guide
CCH esign Quick Start Guide December 2015 2015 CCH Incorporated and its affiliates and licensors. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form or
More informationShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
More informatione-signlive for LotusLive Silanis Online e-signature Services e-signdoc User Guide Connect. Collaborate. Close.
Silanis Online e-signature Services e-signdoc Connect. Collaborate. Close. April 13, 2010 Information in this document is subject to change without notice, and does not represent a commitment on the part
More informationEvaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN)
C O M P L I A N C E G U I D E ELECTRONIC RECORD AND SIGNATURE COMPLIANCE NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) ALPHATRUST PRONTO ENTERPRISE PLATFORM This compliance
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationAlphaTrust PRONTO Enterprise Platform Product Overview
AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that
More informationUsing Entrust certificates with Adobe PDF files and forms
Entrust Managed Services PKI Using Entrust certificates with Adobe PDF files and forms Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or
More informationProblem. Solution. Quatrix is professional, secure and easy to use file sharing.
Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities
More informationTechnical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationInstallation and Administration Guide
Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationREGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
More information59.1-479. Title. This chapter may be cited as the "Uniform Electronic Transactions Act." TOC
59.1-479. Title. 59.1-480. Definitions. 59.1-481. Scope. 59.1-482. Prospective application. 59.1-483. Use of electronic records and electronic signatures; variation by agreement. 59.1-484. Construction
More informationHealthcare Compliance Solutions
Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human
More informationCompliance in the Corporate World
Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue
More informationHealthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
More informationManaging SSL Security in Multi-Server Environments
Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL
More informationSignature Authentication
Signature Authentication aka: How to stop chasing after your clinical staff for signatures Elizabeth Nista, CQIA The Written Signature as a Validation Tool Signature is a requirement of multiple accrediting
More informationFTP-Stream Module: InstantShare End User Guide
FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike
More informationAdobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
More informationEntrust Adobe CDS Individual Certificate
Entrust Certificate Services Entrust Adobe CDS Individual Certificate Enrollment Guide Software release: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2012 Entrust. All rights reserved. Entrust
More informationSAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
More informationUnderstanding E-Signatures: A Beginner s Guide
Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government
More informationUsing Adobe Acrobat X to enhance collaboration with Microsoft SharePoint and Microsoft Office
Using Adobe Acrobat X to enhance collaboration with Microsoft SharePoint and Microsoft Office Accelerate project review cycles by integrating PDF-based workflows into the SharePoint and Office platform
More informationWhy Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more
More informationType of Personal Data We Collect and How We Use It
Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the
More informationELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,
More informationU.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment
More informationMessageGuard 3.0 User Guide
MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages
More informationMANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
More informationUnderstanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
More informationWilliamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
More informationNetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
More informationA Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
More informationHIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
More informationIntertek esignature Customer Reference Document Author: Application Support. Page 1 of 17
Page 1 of 17 Document History Version Amendments Date Amended by 2.1 Corrected index numbering, revised Section 30-Jul-2014 Application Support 1.6 and references to 1.6; Corrected formatting 2.2 Added:
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More informationWhite Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationVerification of digitally signed PDFs
Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren
More informationIBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationElectronic approvals for forms FAQs
Click on any of the boxes below to explore more detail, including answers to frequently asked questions, video quick links, and more. Advisor experience Client experience Security Electronic approvals
More informationCase CATalyst is digital-signature ready! Introduction... 2. What are digital signatures?... 3
Case CATalyst is digital-signature ready! Help insure that your transcript is only seen by your intended recipient. Restrict what other people can do with your transcript. Keep your annual cost to as low
More informationSSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More information+27O.557+! RM Auditor Additions - Web Monitor. Contents
RM Auditor Additions - Web Monitor Contents RM Auditor Additions - Web Monitor... 1 Introduction... 2 Installing Web Monitor... 2 Overview... 2 Pre-requisites for installation... 2 Server installation...
More informationElectronic Signature Approvals
White Paper Electronic Signature Approvals Version 1.1 Last Updated: 20-09-2010 www.sutisoft.com 1 2 3 4 6 7 Abstract Introduction Need for Automation Finding a Suitable Solution SutiSign What is SaaS?
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationData Storage that Looks at Business the Way You Do. Up. cloud
Data Storage that Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
More informationDCA. Document Control & Archiving USER S GUIDE
DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,
More informationDocuShare Email Agent User Guide
DocuShare Email Agent User Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California
More informationIntel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
More informationAntelope Enterprise. Electronic Documents Management System and Workflow Engine
Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.
More informationSecure Messaging is far more than email encryption.
Secure Messaging is far more than email encryption. 1. Product service description It s a powerful yet simple cloud-based secure communications platform that enables greater productivity and collaboration.
More informationAn Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
More informationSoonr Workplace Enterprise Plan Overview
This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where
More informationVersion 3.8. Installation Guide
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
More informationMOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
More informationIntroduction to PhPCollab
Introduction to PhPCollab PhPCollab is an open-source internet-enabled collaboration workspace for project teams. Modeled on Macromedia Sitespring, PhPCollab's architecture allows for the consulting team
More information