Our Commitment to Privacy
At SignVerify, we understand that your privacy is fundamental to your trust in our platform. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our electronic signature services.
We are committed to maintaining the highest standards of data protection and comply with applicable privacy laws, including GDPR, CCPA, and other regional privacy regulations.
We collect information you provide directly to us, such as when you create an account, use our services, or contact us for support. This includes:
• Personal Information: Your name, email address, phone number, company name, job title, and billing information
• Account Credentials: Username, password, and security questions
• Document Data: The content of documents you upload, sign, or send through our platform, including metadata such as timestamps, IP addresses, and device information
• Communication Records: Messages you send to us, including support requests, feedback, and survey responses
• Usage Information: How you interact with our services, including pages visited, features used, time spent, and click patterns
• Device Information: Information about the device you use to access our services, including device type, operating system, browser type, and unique device identifiers
• Location Data: General location information based on your IP address (we do not collect precise geolocation data)
2
How We Use Your Information
We use the information we collect for various purposes, including:
• Service Provision: To provide, maintain, and improve our electronic signature services, including document processing, storage, and delivery
• Account Management: To create and manage your account, authenticate your identity, and provide customer support
• Communication: To send you service-related notifications, updates about our terms or policies, and respond to your inquiries
• Security and Fraud Prevention: To detect, prevent, and address technical issues, unauthorized access, and fraudulent activities
• Legal Compliance: To comply with applicable laws, regulations, and legal processes, including responding to lawful requests from public authorities
• Business Operations: To analyze usage patterns, conduct research and analytics, and improve our services and user experience
• Marketing: To send you promotional materials and updates about new features (only with your consent, and you can opt out at any time)
3
Information Sharing and Disclosure
We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following circumstances:
• With Your Consent: When you explicitly authorize us to share your information
• Service Providers: With trusted third-party service providers who assist us in operating our platform, such as cloud hosting providers, payment processors, and customer support tools. These providers are contractually bound to protect your information
• Legal Requirements: When required by law, regulation, legal process, or governmental request
• Business Transfers: In connection with any merger, acquisition, or sale of assets, your information may be transferred as part of that transaction
• Protection of Rights: To protect our rights, property, or safety, or that of our users or the public, including enforcing our terms of service
• De-identified Data: We may share aggregated or de-identified information that cannot reasonably be used to identify you
4
Data Security and Protection
We implement comprehensive security measures to protect your information:
• Encryption: All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption
• Infrastructure Security: Our services are hosted on SOC 2 Type II certified cloud infrastructure with 24/7 monitoring
• Access Controls: We implement strict access controls, including multi-factor authentication, role-based permissions, and regular access reviews
• Security Audits: We conduct regular security assessments, penetration testing, and vulnerability scans
• Employee Training: Our employees receive regular security training and are bound by confidentiality agreements
• Incident Response: We have established procedures for detecting, responding to, and reporting security incidents
• Data Backup: Regular automated backups are performed to ensure data availability and recovery capabilities
Depending on your location, you may have certain rights regarding your personal information:
• Right to Access: You can request a copy of the personal information we hold about you
• Right to Rectification: You can request that we correct any inaccurate or incomplete information
• Right to Erasure: You can request that we delete your personal information, subject to certain exceptions
• Right to Restrict Processing: You can request that we limit how we use your information
• Right to Data Portability: You can request a copy of your information in a structured, machine-readable format
• Right to Object: You can object to certain types of processing, including direct marketing
• Right to Withdraw Consent: Where processing is based on consent, you can withdraw that consent at any time
• Right to Lodge a Complaint: You can file a complaint with the relevant data protection authority
To exercise these rights, please contact us using the information provided at the end of this policy.