Security & Compliance
Your documents and data are protected by enterprise-grade security measures and industry-leading compliance standards.
Last updated: July 9, 2025
1. Data Encryption
1.1 Encryption in Transit
All data transmitted between your device and our servers is protected using industry-standard encryption protocols:
- TLS 1.3 encryption for all web communications
- Perfect Forward Secrecy (PFS) to protect past sessions
- Certificate pinning to prevent man-in-the-middle attacks
- HSTS (HTTP Strict Transport Security) enforcement
- Regular SSL/TLS certificate rotation and monitoring
1.2 Encryption at Rest
Your documents and personal data are encrypted when stored in our systems:
- AES-256 encryption for all stored documents and data
- Separate encryption keys for each customer
- Hardware Security Modules (HSMs) for key management
- Regular key rotation and secure key storage
- Encrypted database storage and backups
1.3 End-to-End Security
Documents are encrypted from the moment they're uploaded until they're downloaded, ensuring complete protection throughout the entire signing process.
2. Infrastructure Security
2.1 Cloud Infrastructure
Our platform is built on secure, enterprise-grade cloud infrastructure:
- AWS and Azure cloud services with SOC 2 Type II compliance
- Multi-region deployment for high availability and disaster recovery
- Auto-scaling infrastructure to handle varying loads securely
- Network segmentation and virtual private clouds (VPCs)
- DDoS protection and traffic filtering
2.2 Physical Security
Our data centers maintain the highest physical security standards:
- 24/7 physical security monitoring and access controls
- Biometric access controls and multi-factor authentication
- Environmental monitoring and fire suppression systems
- Redundant power and cooling systems
- Regular security audits and compliance assessments
2.3 Network Security
Multiple layers of network security protect against unauthorized access and attacks, including firewalls, intrusion detection systems, and continuous monitoring.
3. Access Controls
3.1 User Authentication
Strong authentication mechanisms protect user accounts:
- Multi-factor authentication (MFA) support
- Single Sign-On (SSO) integration with SAML 2.0
- Password complexity requirements and rotation policies
- Account lockout protection against brute force attacks
- Session management and automatic timeout
3.2 Role-Based Access Control
Granular permissions ensure users only access what they need:
- Customizable user roles and permissions
- Document-level access controls
- Administrative controls for account management
- Audit trails for all access and permission changes
- Regular access reviews and certification processes
3.3 Employee Access
Strict controls govern employee access to customer data, with all access logged and monitored. Our employees undergo background checks and regular security training.
4. Compliance Standards
4.1 Industry Certifications
UltraSign maintains compliance with major industry standards:
- SOC 2 Type II certification for security and availability
- ISO 27001 certification for information security management
- GDPR compliance for European data protection
- CCPA compliance for California consumer privacy
- HIPAA compliance for healthcare organizations
- FedRAMP authorization for government use
4.2 Legal Compliance
Our e-signature technology meets legal requirements worldwide:
- ESIGN Act compliance in the United States
- eIDAS regulation compliance in the European Union
- Electronic signature laws in 190+ countries
- Court-admissible audit trails and evidence packages
- Legal validity verification and documentation
4.3 Regular Audits
We undergo regular third-party security audits and penetration testing to ensure our security measures remain effective and up-to-date with evolving threats.
5. Security Monitoring
5.1 24/7 Monitoring
Our security operations center provides continuous monitoring:
- Real-time threat detection and response
- Automated security incident alerting
- Log analysis and anomaly detection
- Performance and availability monitoring
- Proactive threat hunting and investigation
5.2 Incident Response
We maintain a comprehensive incident response program:
- Dedicated incident response team available 24/7
- Documented incident response procedures
- Customer notification protocols for security incidents
- Post-incident analysis and improvement processes
- Regular incident response training and drills
5.3 Vulnerability Management
Regular vulnerability assessments and penetration testing help identify and address potential security weaknesses before they can be exploited.
6. Data Protection
6.1 Data Residency
We provide data residency options to meet regional compliance requirements:
- Data centers in multiple geographic regions
- Customer choice of data storage location
- Cross-border data transfer protections
- Local data processing capabilities
- Compliance with regional data protection laws
6.2 Data Retention
Clear data retention policies ensure appropriate data lifecycle management:
- Configurable retention periods for different document types
- Automatic data deletion after retention periods
- Legal hold capabilities for litigation requirements
- Secure data destruction procedures
- Customer control over data retention settings
6.3 Data Backup and Recovery
Comprehensive backup and disaster recovery procedures ensure data availability and protection against data loss, with regular testing of recovery procedures.
7. Business Continuity
7.1 High Availability
Our platform is designed for maximum uptime and reliability:
- 99.9% uptime SLA with redundant systems
- Load balancing and auto-scaling capabilities
- Multi-region deployment for failover protection
- Real-time health monitoring and alerting
- Automated recovery procedures
7.2 Disaster Recovery
Comprehensive disaster recovery planning ensures business continuity:
- Recovery Time Objective (RTO) of less than 4 hours
- Recovery Point Objective (RPO) of less than 1 hour
- Regular disaster recovery testing and validation
- Geographically distributed backup systems
- Documented recovery procedures and runbooks
7.3 Communication
Clear communication channels keep customers informed during any service disruptions, with real-time status updates and estimated resolution times.
8. Vendor Security
8.1 Third-Party Risk Management
All third-party vendors undergo rigorous security assessments:
- Security questionnaires and due diligence reviews
- Contractual security requirements and obligations
- Regular vendor security assessments and audits
- Incident notification and response requirements
- Data processing agreements and privacy protections
8.2 Supply Chain Security
We maintain visibility and control over our technology supply chain:
- Software composition analysis and vulnerability scanning
- Secure development lifecycle practices
- Code signing and integrity verification
- Regular security updates and patch management
- Vendor security monitoring and alerting
9. Security Training
9.1 Employee Training
All employees receive comprehensive security training:
- Security awareness training for all new hires
- Regular refresher training and updates
- Role-specific security training programs
- Phishing simulation and testing
- Incident response training and drills
9.2 Security Culture
We foster a security-first culture throughout the organization:
- Security champions program
- Regular security communications and updates
- Security metrics and performance tracking
- Recognition and rewards for security contributions
- Continuous improvement and feedback processes
10. Contact Security Team
For security-related questions, concerns, or to report security vulnerabilities, please contact our security team:
UltraSign Security Team
Security Email: security@ultrasign.net
Vulnerability Reports: security-reports@ultrasign.net
Emergency Security Hotline: +1 (614) 812-4829 ext. 911
Address: 800 N High Street, Columbus, OH 43215
Bug Bounty Program: We welcome responsible disclosure of security vulnerabilities. Please contact our security team for information about our bug bounty program and responsible disclosure process.