SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Continued
Share:
Security is always top of mind at DocuSign, just as it is for
many of our customers. DocuSign is committed to the
secure signing and retention of electronic documents.
Here are industry best practices to protect your documents
and the information you exchange with others:
Share data wisely
The information you share via a smart phone, tablet, laptop, or
desktop has tremendous value—and that makes it an attractive
target for many people, including businesses, competitors, criminals
and even countries conducting industrial espionage. Information
posted out to the public internet is catalogued and referenced by
search engines, making them easy to find by everyone and anyone.
Documents can be copied, posted elsewhere, linked and even altered
by others.
What to do:
degree that you want your own information protected.
you do not want exposed or exploited.
valuable when aggregated with other data, causing exposure about
you, your organization, or a third party.
Manage documents with care
Only make documents public if that is your intent. Once publicly
posted, your information is visible to viewers, collectable by digital
tools and search engines, and may be sold or traded by hackers,
countries and organized crime.
What to do:
extractable, and the information available to be repurposed. While
this does not in and of itself protect the data, it conveys that the
information is intended to be consumed by a wide audience.
exchanging and encourage them to label and safeguard data as a
manner of habit.
consumption.
Require authentication
If you want to restrict the information to only those authorized to
access it over the Internet, make it difficult for people to readily access
industry-standard practice, as is tracking who has accessed information
and documents via authentication.
What to do:
measures to ensure that the people accessing your data are authorized
to do so. The stronger and more complex the authentication, the
greater the protection provided.
and should be a hash or encrypted value that is not stored as a clear-
text password that can be stolen and re-used to impersonate you.
data and monitor those audit trails to ensure only proper access is
being granted.
verify that only authorized people are accessing the documents.
Layer security controls
layers of security, which increases the difficulty for non-authorized
ways to stop “the bad guys.”
What to do:
encrypted.
for sensitive information such as a digital access code that can be sent
to the person directly over other forms of communication, such as
phone or text.
to maintain control over the transaction.
certificates. Be aware of rogue sites that attempt to impersonate
having you enter your authentication data or obtain other private
information.
WHITE PAPER docusign.com
About DocuSign
DocuSign®
is the global standard for electronic signature®
. DocuSign accelerates transactions to increase speed to results, reduce costs, and delight
customers with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud.
866.219.4318 | docusign.com
+44 (0) 800 098 8113 |
can perform actions on computers by capturing and sending out
information and negatively impacting the integrity of your data
without your ready knowledge.
available systems holding data without industry-standard controls,
such as two-factor encrypted authentication to validate the remote
access.
monitor a network and alert personnel about potential unauthorized
access attempts.
research and development, financial data, and personally identifiable
need to be protected with specific security controls and behind
firewalls configured to further restrict access.
Beware of live document links
Internet technology makes it possible to access documents over the
public documents, these links can also lend themselves towards
unintended data exposure if they are used for documents that are
private or confidential.
What to do:
documents are private or confidential.
or further validate the link as legitimate.
confidential information by merely selecting the link, inform the
secure authentication.
Protect the copy of record
If you rely on the integrity of a singular copy of record, ensure that
you have confidence in a reliable version that can be validated so
you can answer any challenge to the copy of record.
What to do:
validates the integrity of the document after each interaction.
for data entry and signature in an order that provides visibility
conduct business faster and with greater satisfaction from all involved
parties.
and transacted with the document. Digital audit trails denote
accountable actions with the data.
provides anti-tampering controls so that only where specified, data
can be entered and validated by the signing parties.
and anti-tampering mechanisms designed into the service. DocuSign
is designed with these controls essential to our eSignature service.
Secure archival storage
their lifecycle while still allowing them to be viewed and transacted
by authorized parties is essential to providing trust, reliability and
business efficiency.
What to do:
insecure protocol where control over the document is unmanaged.
process within their secure repository to validate the integrity of the
document, manage version control of the document, and ensure
oversight of the process by the document sender.
that exposes the data to various personnel. Documents stored with
application level of encryption provide confidentiality and assurance.
While this is a significant engineering effort and is rarely provided,
DocuSign designed and provides this essential layer of protection for
our customers. This ensures that no unauthorized parties, including
system administrators, can view documents.
should also provide tools for you to manage the documents you
create and name to manage and store documents over time.
Computing device security
access your data becomes more available and transportable. It is not
uncommon for people to access documents from a variety of places.
This enables us to conduct our lives and business more efficiently
WHITE PAPER docusign.com
About DocuSign
DocuSign®
is the global standard for electronic signature®
. DocuSign accelerates transactions to increase speed to results, reduce costs, and delight
customers with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud.
866.219.4318 | docusign.com
+44 (0) 800 098 8113 |
by design, but it also introduces exposures and recommendations
to apply awareness and diligence around your mobile computing
activities:
What to do:
are left behind in restaurants, taxis, and even airports and they
protect smart phone devices with the default setting at one minute
or less.
secure authentication to online sites where private or confidential
to prevent impersonation, fraud, and identity theft.
and hard to deduce, and never share your credentials with others.
your digital data resides and how it is protected.
Choose business partners with security
certifications
global standards. DocuSign is the only eSignature provider that
datacenters.
noted exceptions across all aspects of our enterprise business and
environmental, and security access controls.
What to do:
related certifications they have received, and ask to see the reports.
consistency of the business partner in protecting your information to
ensure they align with industry standards.
variety of auditors helps to ensure that a wide range of testing and
Store your signed documents in DocuSign
The cost of implementing industry standard security controls can be
people transact personal and professional business electronically, the
more economical a certified third party service becomes to ensure
the highest levels of protection for your data.
access by all signing parties.
have a guaranteed copy of record and an ongoing digital audit trail
to validate who has viewed and signed your documents up to and
including the most recent activity on those documents.
the latest best practices can reduce risk and give you peace of mind
that your data and documents are protected to the highest means
possible.

Weitere ähnliche Inhalte

Was ist angesagt?

How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyClickSSL
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and securityAwais Haider
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic CommerceDarlene Enderez
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 

Was ist angesagt? (20)

How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
What Is "Secure"?
What Is "Secure"?What Is "Secure"?
What Is "Secure"?
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
HTTPS
HTTPSHTTPS
HTTPS
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
security IDS
security IDSsecurity IDS
security IDS
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Dw communication
Dw communicationDw communication
Dw communication
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 

Andere mochten auch

DocuSign For SugarCRM
DocuSign For SugarCRMDocuSign For SugarCRM
DocuSign For SugarCRMDocuSign
 
Moving towards an electronic real estate transaction
Moving towards an electronic real estate transactionMoving towards an electronic real estate transaction
Moving towards an electronic real estate transactionDocuSign
 
Slash Administrative Costs by eSigning with DocuSign
Slash Administrative Costs by eSigning with DocuSignSlash Administrative Costs by eSigning with DocuSign
Slash Administrative Costs by eSigning with DocuSignDocuSign
 
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013DocuSign
 
Healthcare payers exceeded federally mandated medical loss ratio with esignat...
Healthcare payers exceeded federally mandated medical loss ratio with esignat...Healthcare payers exceeded federally mandated medical loss ratio with esignat...
Healthcare payers exceeded federally mandated medical loss ratio with esignat...DocuSign
 
Century21 DocuSign case study
Century21 DocuSign case studyCentury21 DocuSign case study
Century21 DocuSign case studyDocuSign
 
Customer experience drives e-signature adoption
Customer experience drives e-signature adoptionCustomer experience drives e-signature adoption
Customer experience drives e-signature adoptionDocuSign
 
No More Clipboards: eSignature for Patient Onboarding
No More Clipboards: eSignature for Patient OnboardingNo More Clipboards: eSignature for Patient Onboarding
No More Clipboards: eSignature for Patient OnboardingDocuSign
 
An Introduction to DocuSign for Salesforce
An Introduction to DocuSign for SalesforceAn Introduction to DocuSign for Salesforce
An Introduction to DocuSign for SalesforceDocuSign
 

Andere mochten auch (9)

DocuSign For SugarCRM
DocuSign For SugarCRMDocuSign For SugarCRM
DocuSign For SugarCRM
 
Moving towards an electronic real estate transaction
Moving towards an electronic real estate transactionMoving towards an electronic real estate transaction
Moving towards an electronic real estate transaction
 
Slash Administrative Costs by eSigning with DocuSign
Slash Administrative Costs by eSigning with DocuSignSlash Administrative Costs by eSigning with DocuSign
Slash Administrative Costs by eSigning with DocuSign
 
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013
LinkedIn Sales Solutions: 10 Ways to Utilize Social Selling in 2013
 
Healthcare payers exceeded federally mandated medical loss ratio with esignat...
Healthcare payers exceeded federally mandated medical loss ratio with esignat...Healthcare payers exceeded federally mandated medical loss ratio with esignat...
Healthcare payers exceeded federally mandated medical loss ratio with esignat...
 
Century21 DocuSign case study
Century21 DocuSign case studyCentury21 DocuSign case study
Century21 DocuSign case study
 
Customer experience drives e-signature adoption
Customer experience drives e-signature adoptionCustomer experience drives e-signature adoption
Customer experience drives e-signature adoption
 
No More Clipboards: eSignature for Patient Onboarding
No More Clipboards: eSignature for Patient OnboardingNo More Clipboards: eSignature for Patient Onboarding
No More Clipboards: eSignature for Patient Onboarding
 
An Introduction to DocuSign for Salesforce
An Introduction to DocuSign for SalesforceAn Introduction to DocuSign for Salesforce
An Introduction to DocuSign for Salesforce
 

Ähnlich wie Whitepaper: Best Practices for Electronic Document Management and Security

How Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdfHow Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdfManaged Ousource Solutions
 
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign Drysign By Exela
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...zainsmith017
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Network security
Network securityNetwork security
Network securityROBERT S
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfHokme
 

Ähnlich wie Whitepaper: Best Practices for Electronic Document Management and Security (20)

How Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdfHow Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdf
 
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
How 2FA & eSignatures Ensure the Security of Digital Documents - DrySign
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
Document Security in the Digital Age: Strategies for Protecting Sensitive Inf...
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Data security
Data securityData security
Data security
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Network security
Network securityNetwork security
Network security
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Data security
Data securityData security
Data security
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
 

Mehr von DocuSign

National E-SIGN Day 2017
National E-SIGN Day 2017National E-SIGN Day 2017
National E-SIGN Day 2017DocuSign
 
DOCU-MENTAL.
DOCU-MENTAL.DOCU-MENTAL.
DOCU-MENTAL.DocuSign
 
CLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawCLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawDocuSign
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)DocuSign
 
B2B Marketing in Hyper-Growth Companies - Forrester
B2B Marketing in Hyper-Growth Companies - ForresterB2B Marketing in Hyper-Growth Companies - Forrester
B2B Marketing in Hyper-Growth Companies - ForresterDocuSign
 
Legality of Electronic Signatures -- CLE Webinar 7.12.16
Legality of Electronic Signatures -- CLE Webinar 7.12.16Legality of Electronic Signatures -- CLE Webinar 7.12.16
Legality of Electronic Signatures -- CLE Webinar 7.12.16DocuSign
 
Celebrate National ESign Day with DocuSign
Celebrate National ESign Day with DocuSignCelebrate National ESign Day with DocuSign
Celebrate National ESign Day with DocuSignDocuSign
 
Celebrate National eSign Day 2016 with DocuSign
Celebrate National eSign Day 2016 with DocuSignCelebrate National eSign Day 2016 with DocuSign
Celebrate National eSign Day 2016 with DocuSignDocuSign
 
Why Attend DocuSign MOMENTUM`16 London?
Why Attend DocuSign MOMENTUM`16 London?Why Attend DocuSign MOMENTUM`16 London?
Why Attend DocuSign MOMENTUM`16 London?DocuSign
 
Why Should The Financial Services Industry Go Digital?
Why Should The Financial Services Industry Go Digital?Why Should The Financial Services Industry Go Digital?
Why Should The Financial Services Industry Go Digital?DocuSign
 
Paperless Procurement: Streamline Your Signature Processes for Better Results
 Paperless Procurement: Streamline Your Signature Processes for Better Results Paperless Procurement: Streamline Your Signature Processes for Better Results
Paperless Procurement: Streamline Your Signature Processes for Better ResultsDocuSign
 
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...DocuSign
 
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNIT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNDocuSign
 
How Leading Financial Services Organisations are Keeping Business Digital
How Leading Financial Services Organisations are Keeping Business DigitalHow Leading Financial Services Organisations are Keeping Business Digital
How Leading Financial Services Organisations are Keeping Business DigitalDocuSign
 
How to Enable Faster Sales Cycles
How to Enable Faster Sales CyclesHow to Enable Faster Sales Cycles
How to Enable Faster Sales CyclesDocuSign
 
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignatures
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignaturesHow High Tech & Telecom Companies Grow Quickly & Efficiently with eSignatures
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignaturesDocuSign
 
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNIT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNDocuSign
 
Forrester Guidance on DTM for Procurement FINAL
Forrester Guidance on DTM for Procurement FINALForrester Guidance on DTM for Procurement FINAL
Forrester Guidance on DTM for Procurement FINALDocuSign
 
Forrester Guidance on Digital Transaction Management in Legal
Forrester Guidance on Digital Transaction Management in Legal Forrester Guidance on Digital Transaction Management in Legal
Forrester Guidance on Digital Transaction Management in Legal DocuSign
 

Mehr von DocuSign (20)

National E-SIGN Day 2017
National E-SIGN Day 2017National E-SIGN Day 2017
National E-SIGN Day 2017
 
DOCU-MENTAL.
DOCU-MENTAL.DOCU-MENTAL.
DOCU-MENTAL.
 
Pay-Per
Pay-PerPay-Per
Pay-Per
 
CLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawCLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case law
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
 
B2B Marketing in Hyper-Growth Companies - Forrester
B2B Marketing in Hyper-Growth Companies - ForresterB2B Marketing in Hyper-Growth Companies - Forrester
B2B Marketing in Hyper-Growth Companies - Forrester
 
Legality of Electronic Signatures -- CLE Webinar 7.12.16
Legality of Electronic Signatures -- CLE Webinar 7.12.16Legality of Electronic Signatures -- CLE Webinar 7.12.16
Legality of Electronic Signatures -- CLE Webinar 7.12.16
 
Celebrate National ESign Day with DocuSign
Celebrate National ESign Day with DocuSignCelebrate National ESign Day with DocuSign
Celebrate National ESign Day with DocuSign
 
Celebrate National eSign Day 2016 with DocuSign
Celebrate National eSign Day 2016 with DocuSignCelebrate National eSign Day 2016 with DocuSign
Celebrate National eSign Day 2016 with DocuSign
 
Why Attend DocuSign MOMENTUM`16 London?
Why Attend DocuSign MOMENTUM`16 London?Why Attend DocuSign MOMENTUM`16 London?
Why Attend DocuSign MOMENTUM`16 London?
 
Why Should The Financial Services Industry Go Digital?
Why Should The Financial Services Industry Go Digital?Why Should The Financial Services Industry Go Digital?
Why Should The Financial Services Industry Go Digital?
 
Paperless Procurement: Streamline Your Signature Processes for Better Results
 Paperless Procurement: Streamline Your Signature Processes for Better Results Paperless Procurement: Streamline Your Signature Processes for Better Results
Paperless Procurement: Streamline Your Signature Processes for Better Results
 
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...
Achats sans papier : Rationalisez vos processus de signature afin d’obtenir d...
 
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNIT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
 
How Leading Financial Services Organisations are Keeping Business Digital
How Leading Financial Services Organisations are Keeping Business DigitalHow Leading Financial Services Organisations are Keeping Business Digital
How Leading Financial Services Organisations are Keeping Business Digital
 
How to Enable Faster Sales Cycles
How to Enable Faster Sales CyclesHow to Enable Faster Sales Cycles
How to Enable Faster Sales Cycles
 
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignatures
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignaturesHow High Tech & Telecom Companies Grow Quickly & Efficiently with eSignatures
How High Tech & Telecom Companies Grow Quickly & Efficiently with eSignatures
 
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGNIT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
IT’S ABOUT TIME: SAVE TIME WITH DOCUSIGN
 
Forrester Guidance on DTM for Procurement FINAL
Forrester Guidance on DTM for Procurement FINALForrester Guidance on DTM for Procurement FINAL
Forrester Guidance on DTM for Procurement FINAL
 
Forrester Guidance on Digital Transaction Management in Legal
Forrester Guidance on Digital Transaction Management in Legal Forrester Guidance on Digital Transaction Management in Legal
Forrester Guidance on Digital Transaction Management in Legal
 

Kürzlich hochgeladen

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 

Kürzlich hochgeladen (20)

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 

Whitepaper: Best Practices for Electronic Document Management and Security

  • 1. Continued Share: Security is always top of mind at DocuSign, just as it is for many of our customers. DocuSign is committed to the secure signing and retention of electronic documents. Here are industry best practices to protect your documents and the information you exchange with others: Share data wisely The information you share via a smart phone, tablet, laptop, or desktop has tremendous value—and that makes it an attractive target for many people, including businesses, competitors, criminals and even countries conducting industrial espionage. Information posted out to the public internet is catalogued and referenced by search engines, making them easy to find by everyone and anyone. Documents can be copied, posted elsewhere, linked and even altered by others. What to do: degree that you want your own information protected. you do not want exposed or exploited. valuable when aggregated with other data, causing exposure about you, your organization, or a third party. Manage documents with care Only make documents public if that is your intent. Once publicly posted, your information is visible to viewers, collectable by digital tools and search engines, and may be sold or traded by hackers, countries and organized crime. What to do: extractable, and the information available to be repurposed. While this does not in and of itself protect the data, it conveys that the information is intended to be consumed by a wide audience. exchanging and encourage them to label and safeguard data as a manner of habit. consumption. Require authentication If you want to restrict the information to only those authorized to access it over the Internet, make it difficult for people to readily access industry-standard practice, as is tracking who has accessed information and documents via authentication. What to do: measures to ensure that the people accessing your data are authorized to do so. The stronger and more complex the authentication, the greater the protection provided. and should be a hash or encrypted value that is not stored as a clear- text password that can be stolen and re-used to impersonate you. data and monitor those audit trails to ensure only proper access is being granted. verify that only authorized people are accessing the documents. Layer security controls layers of security, which increases the difficulty for non-authorized ways to stop “the bad guys.” What to do: encrypted. for sensitive information such as a digital access code that can be sent to the person directly over other forms of communication, such as phone or text. to maintain control over the transaction. certificates. Be aware of rogue sites that attempt to impersonate having you enter your authentication data or obtain other private information.
  • 2. WHITE PAPER docusign.com About DocuSign DocuSign® is the global standard for electronic signature® . DocuSign accelerates transactions to increase speed to results, reduce costs, and delight customers with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud. 866.219.4318 | docusign.com +44 (0) 800 098 8113 | can perform actions on computers by capturing and sending out information and negatively impacting the integrity of your data without your ready knowledge. available systems holding data without industry-standard controls, such as two-factor encrypted authentication to validate the remote access. monitor a network and alert personnel about potential unauthorized access attempts. research and development, financial data, and personally identifiable need to be protected with specific security controls and behind firewalls configured to further restrict access. Beware of live document links Internet technology makes it possible to access documents over the public documents, these links can also lend themselves towards unintended data exposure if they are used for documents that are private or confidential. What to do: documents are private or confidential. or further validate the link as legitimate. confidential information by merely selecting the link, inform the secure authentication. Protect the copy of record If you rely on the integrity of a singular copy of record, ensure that you have confidence in a reliable version that can be validated so you can answer any challenge to the copy of record. What to do: validates the integrity of the document after each interaction. for data entry and signature in an order that provides visibility conduct business faster and with greater satisfaction from all involved parties. and transacted with the document. Digital audit trails denote accountable actions with the data. provides anti-tampering controls so that only where specified, data can be entered and validated by the signing parties. and anti-tampering mechanisms designed into the service. DocuSign is designed with these controls essential to our eSignature service. Secure archival storage their lifecycle while still allowing them to be viewed and transacted by authorized parties is essential to providing trust, reliability and business efficiency. What to do: insecure protocol where control over the document is unmanaged. process within their secure repository to validate the integrity of the document, manage version control of the document, and ensure oversight of the process by the document sender. that exposes the data to various personnel. Documents stored with application level of encryption provide confidentiality and assurance. While this is a significant engineering effort and is rarely provided, DocuSign designed and provides this essential layer of protection for our customers. This ensures that no unauthorized parties, including system administrators, can view documents. should also provide tools for you to manage the documents you create and name to manage and store documents over time. Computing device security access your data becomes more available and transportable. It is not uncommon for people to access documents from a variety of places. This enables us to conduct our lives and business more efficiently
  • 3. WHITE PAPER docusign.com About DocuSign DocuSign® is the global standard for electronic signature® . DocuSign accelerates transactions to increase speed to results, reduce costs, and delight customers with the easiest, fastest, most secure global network for sending, signing, tracking, and storing documents in the cloud. 866.219.4318 | docusign.com +44 (0) 800 098 8113 | by design, but it also introduces exposures and recommendations to apply awareness and diligence around your mobile computing activities: What to do: are left behind in restaurants, taxis, and even airports and they protect smart phone devices with the default setting at one minute or less. secure authentication to online sites where private or confidential to prevent impersonation, fraud, and identity theft. and hard to deduce, and never share your credentials with others. your digital data resides and how it is protected. Choose business partners with security certifications global standards. DocuSign is the only eSignature provider that datacenters. noted exceptions across all aspects of our enterprise business and environmental, and security access controls. What to do: related certifications they have received, and ask to see the reports. consistency of the business partner in protecting your information to ensure they align with industry standards. variety of auditors helps to ensure that a wide range of testing and Store your signed documents in DocuSign The cost of implementing industry standard security controls can be people transact personal and professional business electronically, the more economical a certified third party service becomes to ensure the highest levels of protection for your data. access by all signing parties. have a guaranteed copy of record and an ongoing digital audit trail to validate who has viewed and signed your documents up to and including the most recent activity on those documents. the latest best practices can reduce risk and give you peace of mind that your data and documents are protected to the highest means possible.