Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Legalesign

(295)4.8/5

87.0

Nps Score

Already have Legalesign?

All Legalesign Discussions

# What is Legalesign used for? What is Legalesign used for? ##### Post Metadata
- Posted at: about 2 years ago - Author title: Pinned by G2 as a common question
# Can the document be signed by more than 1 person? Multiple Signee ##### Post Metadata
- Posted at: over 9 years ago
- Net upvotes: 3
# Is there an audit log for each document? Audit Log ##### Post Metadata
- Posted at: over 9 years ago
- Net upvotes: 2
# Can the signing progress be tracked? Tracking ##### Post Metadata
- Posted at: over 9 years ago
- Net upvotes: 2
# Is the document tamper-proof? Tampering ##### Post Metadata
- Posted at: over 9 years ago
- Net upvotes: 2
# Is the service encrypted, and if so to what level? Encrypted Service ##### Post Metadata
- Posted at: over 9 years ago
- Net upvotes: 2
# Are signed PDFs certified? Yes we use Adobe CDS certificates and industry leading Luna hardware security modules (HSM) for certificate storage. Certificates are long-term validated (LTV) for longevity of proof. ##### Post Metadata
- Posted at: about 10 years ago
- Net upvotes: 2
# What volume are you currently doing? We are currently sending just over 1000 documents per day. ##### Post Metadata
- Posted at: about 10 years ago
- Net upvotes: 2
# What security policies, procedures and softwares are in place? We operate a suite of ongoing security tools and methodologies for example, constant monitoring including intrusion detection and integrity checking, file checks, scans and file encryption. Access is strictly limited and controlled. While we have counter-measures for attacks on passwords, please make sure your own password is a good one (8 or more characters, mixed digit/letter and upper/lower case), and we recommend changing it intermittently. Within the system you can increase the strength of your own passwords, force them to be changed periodically and use two-factor authentication. An access control policy is in place. We use the full array of methods to ensure restrictions on access, with a system architecture hardened for and designed around security. A developer is a nominated security officer responsible for tracking software updates and critical security updates, notifying developers and ensuring updates are executed. Standard system updates are applied routinely. ##### Post Metadata
- Posted at: about 10 years ago
- Net upvotes: 2
# Are you SSL secure? Yes. We are Qualys A rated, support perfect forward secrecy. No part of the systems is accessible over HTTP. We use strong encryption. ##### Post Metadata
- Posted at: about 10 years ago
- Net upvotes: 2

Start a New Software Discussion

Have a software question?

Get answers from real users and experts

Start A Discussion

Product Avatar Image

Have you used Legalesign before?

Answer a few questions to help the Legalesign community

Top Contributors in Legalesign

1
Andreea Maria D.
AD

Andreea Maria D.

Support and Community Executive

3 pts
2
KS

Kellie S.

Legal Virtual Assistant

1 pt