Security & Privacy
- Types of Authentication
- I’ve asked my signers to authenticate with Knowledge-Based Authentication (KBA) but they are objecting to the questions and/or finding them too difficult to answer. What should I do?
- Is the information I provide secure and safe?
- I'm being asked questions to login and I don't know the answers
- Will the validity of the digital signatures outlast the certificate expiration date?
- What does SIGNiX's system do with the information it receives from users?
- Do you create the signing certificates and credentials for each user?
- Is an audit log generated that includes information on each transaction?
- Is your datacenter SAS-70 certified?
- My signers are failing to answer the Submitted Questions correctly. Why is this happening?
- How does SIGNiX destroy documents when they are no longer needed?
- What information may be recorded when a user creates a digital signature using SIGNiX?
- How does SIGNiX protect clients from tampering?
- How does SIGNiX protect the signing credentials and keys?
- I left my company. Can I remove my identity from SIGNiX's system?
- Does SIGNiX store audit log records?
- Why do I sometimes need to use a password or PIN?
- Is the audit log secured against tampering?
- Does the system keep records of user activity?