Vendor Questions. esignatures Request for information InsureSign

Size: px
Start display at page:

Download "Vendor Questions. esignatures Request for information InsureSign"

Transcription

1 InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing Ceremony 1.1 Describe your solution s signing ceremony (how does the signing process work, including authentication, signing the document, and delivery of the document). 2. Consent 2.1 How does the solution prove that consent to use electronic means for both signatures and ongoing delivery of information was provided by the user? 2.2 How does the user indicate acceptance (i.e., click a button, provide a signature, etc.) 3. In Writing 3.1 How does your solution provide access to documents? The signer receives an (or text message) with a link to sign the document. If a password has been selected, they enter it. They are presented with a signing page where they review and sign the document. They may then receive a copy via , or a link to create an account and then retrieve it. There is a required checkbox and verbiage that shows that by checking the box they agree. Checkbox (above) They normally receive a copy via , and a copy is available in their cloud account also. 3.2 How will documents be stored? They are stored in geographically diverse, secured data centers, automatically backed up to different centers. 3.3 In what form will documents be stored? They are stored as digitally signed PDFs.

2 3.4 Are the servers located in Canada? No, US. Documents can be automatically sent via after completion to a Canadian cloud storage provider if desired. Most cloud providers offer this storage option. 3.5 How is access to a document determined/permitted? 3.6 When will access be granted to each contracting party and for how long? Only senders and signers are allowed access. There is also the option for the sender to set a CC recipient as well. Access is currently unlimited as long as they have an active account. Of course, they can keep the PDF copy they receive however they like. 3.7 Access to the documents if user Once the account is cancelled, the documents can be verified via a wants to change providers/no longer uses provider? document code, but online access stops. They would need to use locally stored documents. The document code is a unique code with a URL to a page with the verification that the document is valid and was signed. The audit page (without document data) can also be accessed. 3.8 Backup/disaster recovery plans? All data centers are fully redundant with full disaster backup plans. 4. Original Copy 4.1 Will each contracting party (including any assignee) be able to access, retain, use, print and store a copy of the documents? 4.2 How is document integrity assured? A digital certificate is applied to each completed document, and a complete audit trail is included in the document How does your solution prevent changes to the document content that may occur on communication, storage and display? Digital certificate (above)

3 4.2.2 Can the document (look/file type/content) be altered during its lifecycle? Who will have the ability to do so? What security measures prevent unauthorized modification? How are changes to the document tracked through its lifecycle? Will there exist a single authoritative copy of the electronic document that is unique, identifiable and unalterable? Can this authoritative copy identify assigned parties as the owner or secured party with a security interest therein? How can the authoritative copy be distinguished from other copies? No (see above) n/a Digital signing above Complete audit trail yes, all parties to the document Digital certificate How does the authoritative copy mark changes as authorized or unauthorized? See above Who owns the final document? The sender and signer both receive copies

4 5. Contract Formation / Electronic Form 6. Timing and Receipt of Electronic Document 7. Electronic Signature Is it possible for the electronic vendor to sell, provide or otherwise use such electronic document without the owner s consent? 5.1 What opportunities will the contracting parties be given to review the contract before submitting? 5.2 If a mistake is found, how can it be fixed prior to submitting? 5.3 Does the solution have notification procedures that allow contracting parties to contact each other and/or your company so that an error can be fixed? 5.4 Does the solution allow the publisher to impose an expiration date on the document, after which it will no longer allow recipients to sign? 6.1 How does the any contracting party or assignee become aware when documents have been sent / viewed / signed / finalized? When it is not delivered? 7.1 How will the digital signatures applied by parties to the contract meet the definition of an electronic signature? How does your solution generate electronic signatures? (i.e., what standards are used as part of the No, against terms of use The full document is presented and is scrollable and zoomable The document would have to be cancelled, with an explanation back to the sender. Then resent. Via the cancellation procedure, notes can be attached. s can be configured to be sent during these events, and the desktop component can also display alerts. They are PDF-standard digital signatures, with a trusted authority (Adobe) Adobe in-house Document Cloud standards

5 process?) How is the electronic signature linked with the document? 7.2 Is your solution flexible with regards to technological advances and future legal requirements concerning electronic signatures as they arise? 7.3 How may a contracting party provide a signature (e.g., scribe, click, etc.) 7.4 Does your solution support multiple signatures within the same document from multiple parties? 8. Authentication 8.1 How can it be proven that the documents are contracts entered into by the contracting parties (e.g., , SMS, etc.)? How and where is the proof thereof stored? How can it be accessed and by whom (e.g., contracting parties, assignees, etc.)? 8.2 What safeguards are in place to verify the identity of the contracting parties? There is a link in the signature to the audit page online. Also, it is graphically represented and detailed in the audit trail attached., easily adaptable to future changes in legal requirements. They can type a signature, draw a signature, or upload a scanned image if they have an account with us., multiple signers, as well as the sender s signature. verification is the primary method, but passwords may be set for opening and signing the document. SMS verification is also offered. It is stored in our backend system, but is detailed in the attached, digitally certified audit trail as well. Each of the parties and cc s can access it. See above.

6 9. Electronic Evidence 8.3 Can recipients of an electronic document forward signature requests to others? How is authentication maintained? 8.4 What is the workflow for maintaining authentication when signing in person? 9.1 How will the integrity of your solution be provable? What mechanisms are in place to track system operations and downtime? What are the system maintenance practices? What information is backed up and what is the disaster recovery plan? Currently, we do not allow signers to forward requests for signature. The document is protected by a combination of name and password to access the signing screen. Our solution runs on Adobe Document Cloud, and is consistent with their normal procedures. There is a publicly available downtime tracker. All data is kept in multiple, geographically diverse data centers that are continually monitored and updated. All information including the data table of transactions/documents What system security measures are in place? Who will have control over the documents? All data centers are protected with advanced hardware security and also physically protected with limited access and armed guards. Adobe and InsureSign, and the sender and signer will have access Is there any reason to doubt the integrity of the system? No

7 9.2 Will the electronic signatures of your solution meet the federal legislative requirements for a secure electronic signature? Will the prescribed process be followed? If not, detail any variations How will signature certificates be validated? How is it known if the certificate has expired or been revoked? Will signature certificates be supported by other signature certificates? Who is the certification authority? Have they passed the vetting process of the Treasury Board? How does an individual receive public and private keys? What controls are there on receiving public and private keys? What controls are there on issuing public and private keys? The certificate will be issued by a trusted root certificate authority Built-in to Adobe Acrobat and in the PDF specification The root certificate will be attached to the PDF Adobe / yes We do not issue the public/private keys in our web-based solution See See 9.2.6

8 9.2.9 Do you use a hash algorithm to create a message digest? If so, describe. 9.3 What support do you provide to clients in the event of a legal dispute?, internally Complete audit trail and certificate authority details 10. Audit Trail 10.1 What is included in the audit trail? Creation, sending, password validation, and signing details. Also, any declines/cancels 10.2 Where is the audit trail for the document stored, and how may it be accessed by contracting parties? 10.3 Does your solution have the ability to reproduce the transaction from start to finish? 10.4 How is electronic evidence provided to a third party (e.g., courts) in the event of a dispute? 10.5 Does your solution conform to legislated evidentiary requirements (e.g., Canadian General Standards Board s Electronic Records as Documentary Evidence CAN/CGSB )? 11. Privacy 11.1 How will the privacy of contractors and their personal information be assured? (e.g., PIPEDA compliance, etc.) It is stored in our internal data structure, and also appended to each document yes Case-by-case basis, but most exists right in the document. A data export can also be arranged. Our platform conforms with the Canadian Uniform Electronic Commerce Act (UECA) Password security on accounts, encryption on retained data

9 What information is stored by the system? All information needed to produce the audit trail, and also pre- and post-signing documents Where is it stored? Geographically diverse data centers in the US Who has access to the information? What security procedures exist? What is the information used for and by whom is it used? How long is the information stored? In what form is the information stored? Contract participants, and tier 2 technicians Physical and network hardware security is extensive Outside the contracting parties, information would only be accessed to diagnose a problem or in the event of a dispute Indefinitely Electronic data structure and PDF

10 2. End-User Functionality Questionnaire This section corresponds to the operational aspects of your esignature solution. # Functionality Items Questions Responses 1. Field Overlay 1.1 Can a signature field be overlaid on top of a form? 1.2 Does your solution support multiple signatures within the same document from multiple parties? 1.3 Can additional fields be overlaid on top of a form? 2. Document Management 2.1 How are the documents organized from a broker's point of view? The broker/sender can send as many documents to the software as they like. We assemble them all as thumbnails prior to sending. 2.2 Does your solution support multiple signed documents as a single transaction? 2.3 What is the size limit per document? No limit 2.4 What document formats are supported? Any document that can be printed can be sent (Word, PDF, Excel, HTML, etc.) 2.5 Can customers attach supplemental documents with the document to be signed? by simply printing them in Documents can be printed utilizing the InsureSign virtual printer component, which installs like a real printer, showing up on the

11 # Functionality Items Questions Responses 3. Broker Management System (BMS) Integration 4. Compatibility 3.1 Are there APIs available to provide the ability for your solution to integrate with third-party applications such as Broker Management Systems (BMS)? 3.2 How are finalized documents transferred to a BMS (e.g., manual, FTP, etc.) 4.1 What web browsers does your solution support? 4.2 What operating systems does your solution support? 4.3 Will users have to install software to sign documents? 4.4 Is your solution compatible with the Citrix environment? printer list, only with no hardward involved. Any document(s) printed to this printer will show up in InsureSign, ready for sending to the signer. There are several methods available manual, , HTTP PUT, API connection All modern browsers All No 5. Mobile 5.1 Are customers able to sign using mobile devices (tablets / smartphones)? If so, what does it look like from an enduser perspective? 6. User-Friendly 6.1 Are contracting parties able to partially complete the signing process and finish at a later time? How is there is a mobile-specific interface All mobile devices are supported by our universal signing interface. Not currently, but in an upcoming version

12 # Functionality Items Questions Responses security/authentication maintained? 7. Admin Account 7.1 Is there an admin account that has the ability to monitor/control other user privileges? 8. Reporting Tools 8.1 Are there any reporting features? 8.2 Are the reports out of the box? Can they be customized?, can be customized and automated 9. Branding 9.1 How can customers customize and brand the documents they wish to have signed? 9.2 Can users customize s sent by your solution? 10. Reliability 10.1 Has your solution been involved in any security or legal disputes within the past five years? If so, describe. Logos and footers can be customized, as well as the body of the sent to signers See above No

13 3. Services and Pricing Questionnaire This section corresponds to the customer support and pricing models of your solution. # Services and Pricing Items Questions Responses 1. Technical Support 1.1 Is there a help line for customer issues/questions with the solution? shown right on our website 2. Versions / Pricing Model 2.1 What different versions does the software include? Only one version of software, different pricing is annual vs monthly and also depends on user seats 2.2 What deployment options (i.e., cloud, behind firewall, etc.) are available? Several web-based, desktop-based within local network, terminal server/citrix 2.2 What is the pricing model? Priced per user-seat, discount for annual billing. Free 30-day unlimited trial. Unlimited signers and documents on all plans.

Vendor Questions. esignatures Request for information - RightSignature

Vendor Questions. esignatures Request for information - RightSignature Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing Ceremony

More information

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

CoSign for 21CFR Part 11 Compliance

CoSign for 21CFR Part 11 Compliance CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

dobe Acrobat XI Pro Digital Signatures

dobe Acrobat XI Pro Digital Signatures dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this

More information

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

GovDelivery Email Subscription Management System

GovDelivery Email Subscription Management System Privacy Impact Assessment for the GovDelivery Email Subscription Management System March 7, 2008 Contact Point Tina Kelley Internet Services Office E-Gov Services Staff 202-616-0992 Reviewing Official

More information

Automation for Electronic Forms, Documents and Business Records (NA)

Automation for Electronic Forms, Documents and Business Records (NA) Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust

More information

Adobe Digital Signatures in Adobe Acrobat X Pro

Adobe Digital Signatures in Adobe Acrobat X Pro Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.

More information

Adobe Developer Workshop Series

Adobe Developer Workshop Series Adobe Developer Workshop Series Working with Security February 2005 San Francisco, California 2005 Adobe Systems Incorporated. All Rights Reserved. Agenda Introduction Overview of Intelligent Document

More information

Legalesign Service Definition Electronic signature and contract management service

Legalesign Service Definition Electronic signature and contract management service Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

Filestor Digital Asset Management. The way it works

Filestor Digital Asset Management. The way it works Filestor Digital Asset Management The way it works Filestor is an Advanced Digital Asset Management System Filestor is far more than a Digital Asset Management System as it has been designed to be flexible

More information

Creating Digital Signatures

Creating Digital Signatures About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Inside Electronic Signature APIs

Inside Electronic Signature APIs Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Legal IT 4.0 Electronic Signatures Monday, April 26, 2010

Legal IT 4.0 Electronic Signatures Monday, April 26, 2010 Legal IT 4.0 Electronic Signatures Monday, April 26, 2010 Michael Laurie, Vice-President & Co-founder Silanis Technology Inc., 2008 All Rights Reserved About Silanis Experience Shaping the industry since

More information

Knowledge based authentication (KBA)

Knowledge based authentication (KBA) Knowledge based authentication (KBA) Overview Knowledge based authentication (KBA) is an advanced identity validation method to authenticate a signer by asking random questions selected from public and

More information

Moving Towards an Electronic Real Estate Transaction

Moving Towards an Electronic Real Estate Transaction Moving Towards an Electronic Real Estate Transaction The Electronic Signature Legal Overview (U.S.) August 2010 1 Introduction Every real estate transaction involves the parties to the transaction putting

More information

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Managed Services PKI 60-day Trial Quick Start Guide

Managed Services PKI 60-day Trial Quick Start Guide Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform

More information

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4 GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING

More information

Enterprise SSL FEATURES & BENEFITS

Enterprise SSL FEATURES & BENEFITS Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal

More information

Data Storage That Looks at Business the Way You Do. Up. cloud

Data Storage That Looks at Business the Way You Do. Up. cloud Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides

More information

IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM

IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT DATA PRESERVATION EXPLANATORY NOTES : The preservation of information

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

CCH esign. Quick Start Guide

CCH esign. Quick Start Guide CCH esign Quick Start Guide December 2015 2015 CCH Incorporated and its affiliates and licensors. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form or

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

e-signlive for LotusLive Silanis Online e-signature Services e-signdoc User Guide Connect. Collaborate. Close.

e-signlive for LotusLive Silanis Online e-signature Services e-signdoc User Guide Connect. Collaborate. Close. Silanis Online e-signature Services e-signdoc Connect. Collaborate. Close. April 13, 2010 Information in this document is subject to change without notice, and does not represent a commitment on the part

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN)

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) C O M P L I A N C E G U I D E ELECTRONIC RECORD AND SIGNATURE COMPLIANCE NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) ALPHATRUST PRONTO ENTERPRISE PLATFORM This compliance

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

AlphaTrust PRONTO Enterprise Platform Product Overview

AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that

More information

Using Entrust certificates with Adobe PDF files and forms

Using Entrust certificates with Adobe PDF files and forms Entrust Managed Services PKI Using Entrust certificates with Adobe PDF files and forms Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or

More information

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Problem. Solution. Quatrix is professional, secure and easy to use file sharing. Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

REGULATIONS COMPLIANCE ASSESSMENT

REGULATIONS COMPLIANCE ASSESSMENT ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS

More information

59.1-479. Title. This chapter may be cited as the "Uniform Electronic Transactions Act." TOC

59.1-479. Title. This chapter may be cited as the Uniform Electronic Transactions Act. TOC 59.1-479. Title. 59.1-480. Definitions. 59.1-481. Scope. 59.1-482. Prospective application. 59.1-483. Use of electronic records and electronic signatures; variation by agreement. 59.1-484. Construction

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human

More information

Compliance in the Corporate World

Compliance in the Corporate World Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

Managing SSL Security in Multi-Server Environments

Managing SSL Security in Multi-Server Environments Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL

More information

Signature Authentication

Signature Authentication Signature Authentication aka: How to stop chasing after your clinical staff for signatures Elizabeth Nista, CQIA The Written Signature as a Validation Tool Signature is a requirement of multiple accrediting

More information

FTP-Stream Module: InstantShare End User Guide

FTP-Stream Module: InstantShare End User Guide FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike

More information

Adobe Digital Publishing Security FAQ

Adobe Digital Publishing Security FAQ Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server

More information

Entrust Adobe CDS Individual Certificate

Entrust Adobe CDS Individual Certificate Entrust Certificate Services Entrust Adobe CDS Individual Certificate Enrollment Guide Software release: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2012 Entrust. All rights reserved. Entrust

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

Understanding E-Signatures: A Beginner s Guide

Understanding E-Signatures: A Beginner s Guide Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government

More information

Using Adobe Acrobat X to enhance collaboration with Microsoft SharePoint and Microsoft Office

Using Adobe Acrobat X to enhance collaboration with Microsoft SharePoint and Microsoft Office Using Adobe Acrobat X to enhance collaboration with Microsoft SharePoint and Microsoft Office Accelerate project review cycles by integrating PDF-based workflows into the SharePoint and Office platform

More information

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more

More information

Type of Personal Data We Collect and How We Use It

Type of Personal Data We Collect and How We Use It Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the

More information

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,

More information

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

Understanding and Integrating KODAK Picture Authentication Cameras

Understanding and Integrating KODAK Picture Authentication Cameras Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

NetWrix File Server Change Reporter. Quick Start Guide

NetWrix File Server Change Reporter. Quick Start Guide NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Intertek esignature Customer Reference Document Author: Application Support. Page 1 of 17

Intertek esignature Customer Reference Document Author: Application Support. Page 1 of 17 Page 1 of 17 Document History Version Amendments Date Amended by 2.1 Corrected index numbering, revised Section 30-Jul-2014 Application Support 1.6 and references to 1.6; Corrected formatting 2.2 Added:

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

White Paper. Support for the HIPAA Security Rule PowerScribe 360

White Paper. Support for the HIPAA Security Rule PowerScribe 360 White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Verification of digitally signed PDFs

Verification of digitally signed PDFs Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Electronic approvals for forms FAQs

Electronic approvals for forms FAQs Click on any of the boxes below to explore more detail, including answers to frequently asked questions, video quick links, and more. Advisor experience Client experience Security Electronic approvals

More information

Case CATalyst is digital-signature ready! Introduction... 2. What are digital signatures?... 3

Case CATalyst is digital-signature ready! Introduction... 2. What are digital signatures?... 3 Case CATalyst is digital-signature ready! Help insure that your transcript is only seen by your intended recipient. Restrict what other people can do with your transcript. Keep your annual cost to as low

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

+27O.557+! RM Auditor Additions - Web Monitor. Contents

+27O.557+! RM Auditor Additions - Web Monitor. Contents RM Auditor Additions - Web Monitor Contents RM Auditor Additions - Web Monitor... 1 Introduction... 2 Installing Web Monitor... 2 Overview... 2 Pre-requisites for installation... 2 Server installation...

More information

Electronic Signature Approvals

Electronic Signature Approvals White Paper Electronic Signature Approvals Version 1.1 Last Updated: 20-09-2010 www.sutisoft.com 1 2 3 4 6 7 Abstract Introduction Need for Automation Finding a Suitable Solution SutiSign What is SaaS?

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Data Storage that Looks at Business the Way You Do. Up. cloud

Data Storage that Looks at Business the Way You Do. Up. cloud Data Storage that Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides

More information

DCA. Document Control & Archiving USER S GUIDE

DCA. Document Control & Archiving USER S GUIDE DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,

More information

DocuShare Email Agent User Guide

DocuShare Email Agent User Guide DocuShare Email Agent User Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Antelope Enterprise. Electronic Documents Management System and Workflow Engine

Antelope Enterprise. Electronic Documents Management System and Workflow Engine Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.

More information

Secure Messaging is far more than email encryption.

Secure Messaging is far more than email encryption. Secure Messaging is far more than email encryption. 1. Product service description It s a powerful yet simple cloud-based secure communications platform that enables greater productivity and collaboration.

More information

An Introduction to Entrust PKI. Last updated: September 14, 2004

An Introduction to Entrust PKI. Last updated: September 14, 2004 An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In

More information

Soonr Workplace Enterprise Plan Overview

Soonr Workplace Enterprise Plan Overview This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the

More information

Introduction to PhPCollab

Introduction to PhPCollab Introduction to PhPCollab PhPCollab is an open-source internet-enabled collaboration workspace for project teams. Modeled on Macromedia Sitespring, PhPCollab's architecture allows for the consulting team

More information