Court-Admissible Audit Logs
GetSignature’s court-admissible and tamper-evident Certificate of Authenticity contains a comprehensive audit trail that lists every action that occurred on a document with a verifiable time-stamp to provide defensible proof of access, review and signature.
Signatures and other information collected from recipients through the GetSignature service are cryptographically bound to a document through the audit trail.
This non-editable audit trail contains a globally unique identifier, that can be used to look up a record in our database that shows all parties involved in the document and their signatures. These records include an encrypted hash of the PDF document which can be used to compare to the encrypted hash of a provided document to determine whether or not it has been modified since the time of it’s completion.
Our hashing algorithm verifies that documents have not been modified since the time of their completion, and our world-class PKI digital certificate technology secures documents, signatures and other recorded information with a tamper-evident seal.
Some of the events and information recorded in the audit-trail are as follows:
- Full name and email address of all parties involved
- Digital signatures, when applicable
- Party authentication method
- Public IP addresses
- Device and operating system information
- Chain of custody for events (sent, opened, signed, etc.)
We reserve the right to change this Policy without providing you with any advance notice
of our intent to make the changes. We may amend this Policy from time to time, and will
post any changes here, so that you are familiar with the Policy adopted by jeylabs.
Notwithstanding the right to amend the Policy as aforesaid, jeylabs will not use your
personal information in a manner materially different from this Policy without your
This statement is subject in all respects of use of this website and all interactions with us. This content was last updated on 20th July 2020.