<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

The SIGNiX signing process is based on digital signatures, the ‘gold standard’ of electronic signature technologies. Our model is superior due to the fact that SIGNiX understands that signatures are a critical element of valuable transactions…not something that can simply be rendered with one click. As such, SIGNiX respects the value of our customer’s information and their transactions.

What about the SIGNiX solution is different?

  • SIGNiX requires parties to the transaction to enter a  Signing PIN (password) they created when accessing their signed documents, transactions and audit information. Administrators must also authenticate to view this information. Documents cannot be downloaded or viewed without this PIN.
  • Although SIGNiX can readily be used as a storage service for documents, it is neither necessary nor recommended in most cases. SIGNiX recognizes that users have widely varying requirements for the storage of customer transactions and information and would prefer to take on the responsibility for storing those documents alongside other documents they already manage for their business. SIGNiX does keep a copy of the audit trail for evidentiary purposes, but this information is not publicly accessible from SIGNiX.
  • SIGNiX does not require parties to a transaction to visit the SIGNiX site simply to verify an individual’s signature. Because SIGNiX uses digital signatures for each and every signature and initial in a signing transaction, this information is embedded directly into the PDF produced by the service, so that it is easy to track the integrity of a document from the first signature to the last, for the life of the document. Other eSignature vendors may add a digital signature after everyone has clicked to sign, meaning you have to rely on the vendor’s service to access this detailed information about each signature and version of the document in the process.
  • SIGNiX requires users to authenticate to gain access to a signing transaction. The documents will not be displayed or made available to be signed unless the user is correctly authenticated. SIGNiX offers a wide range of authentication options that scale depending on the level of risk anticipated in the transaction, from simple email verification to SMS text messages to full knowledge-based authentication and identity vetting.

Free e-signature security eBook

You may also like

SIGNiX Exceeds ACORD's Insurance Industry Requirements
SIGNiX Exceeds ACORD's Insurance Industry Requirements
27 July, 2012

The Association for Cooperative Operations Research and Development, commonly known as ACORD, has released an informativ...

E-Signing Is Easier Than Ever
E-Signing Is Easier Than Ever
12 January, 2016

In 2003 I began using my first e-signing technology: an ePad. You know, the device that has no screen, just a fake pen o...

What to Look for in an Electronic Signature Solution to Minimize Risk
What to Look for in an Electronic Signature Solution to Minimize Risk
10 July, 2012

PART 3 - In the last blog entry for our ongoing series on Digital Signature ROI, we asked the question, “What Makes an E...