<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

The SIGNiX signing process is based on digital signatures, the ‘gold standard’ of electronic signature technologies. Our model is superior due to the fact that SIGNiX understands that signatures are a critical element of valuable transactions…not something that can simply be rendered with one click. As such, SIGNiX respects the value of our customer’s information and their transactions.

What about the SIGNiX solution is different?

  • SIGNiX requires parties to the transaction to enter a  Signing PIN (password) they created when accessing their signed documents, transactions and audit information. Administrators must also authenticate to view this information. Documents cannot be downloaded or viewed without this PIN.
  • Although SIGNiX can readily be used as a storage service for documents, it is neither necessary nor recommended in most cases. SIGNiX recognizes that users have widely varying requirements for the storage of customer transactions and information and would prefer to take on the responsibility for storing those documents alongside other documents they already manage for their business. SIGNiX does keep a copy of the audit trail for evidentiary purposes, but this information is not publicly accessible from SIGNiX.
  • SIGNiX does not require parties to a transaction to visit the SIGNiX site simply to verify an individual’s signature. Because SIGNiX uses digital signatures for each and every signature and initial in a signing transaction, this information is embedded directly into the PDF produced by the service, so that it is easy to track the integrity of a document from the first signature to the last, for the life of the document. Other eSignature vendors may add a digital signature after everyone has clicked to sign, meaning you have to rely on the vendor’s service to access this detailed information about each signature and version of the document in the process.
  • SIGNiX requires users to authenticate to gain access to a signing transaction. The documents will not be displayed or made available to be signed unless the user is correctly authenticated. SIGNiX offers a wide range of authentication options that scale depending on the level of risk anticipated in the transaction, from simple email verification to SMS text messages to full knowledge-based authentication and identity vetting.

Free e-signature security eBook

You may also like

What You Should Know About the IRS's Electronic Signature Rules
What You Should Know About the IRS's Electronic Signature Rules
23 December, 2013

Early this year, the IRS created a set of rules for electronic signatures used for the 4506-T form and 4506T-EZ form thr...

SIGNiX Exceeds ACORD's Insurance Industry Requirements
SIGNiX Exceeds ACORD's Insurance Industry Requirements
27 July, 2012

The Association for Cooperative Operations Research and Development, commonly known as ACORD, has released an informativ...

SIGNiX Exceeds New IRS Guidelines for Electronic Signatures
SIGNiX Exceeds New IRS Guidelines for Electronic Signatures
13 March, 2014

SIGNiX’s digital signature products exceed newly published IRS standards for electronic signatures on forms 8878 and 887...