eSignova is built with enterprise-grade security controls and evidence collection practices to support compliance requirements in regulated industries. This page describes our security architecture, audit capabilities, and compliance approach.
Last Updated: March 21, 2026
Every document is cryptographically sealed for tamper-evident integrity
Cryptographically linked audit logs prevent tampering
S3 'Lock' buckets ensure completed documents cannot be modified
eSignova implements a defense-in-depth security architecture with multiple layers of protection:
Every document on every plan is sealed using Public Key Infrastructure (PKI) digital signatures to ensure tamper-evident integrity.
How it works:
Standards: eSignova's digital sealing is based on industry-standard PKI cryptography and X.509 digital certificates.
eSignova generates comprehensive, hash-chained audit logs for every signing workflow. These logs are cryptographically linked to prevent tampering and provide verifiable evidence of all workflow events.
What we log:
Hash-Chaining: Each audit log entry is cryptographically hashed and linked to the previous entry, creating an immutable chain. Any attempt to modify or delete an entry breaks the chain, making tampering detectable.
Evidence Packages: Completed envelopes include the signed document, full audit trail, verification records, and completion certificate, everything needed for legal defensibility.
Completed envelopes are stored in immutable S3 'Lock' buckets to ensure permanent, tamper-proof archiving.
Immutability guarantees:
Retention: Completed envelopes are retained according to your subscription plan and legal requirements. You may download evidence packages at any time.
Compliance support: Immutable archiving helps satisfy regulatory requirements for document retention, audit trails, and non-repudiation in industries like healthcare (21 CFR Part 11), finance (SOX), and legal services.
eSignova implements multiple layers of access controls to ensure only authorized users can access documents and signing workflows.
Sender authentication:
Signer verification:
Document access controls:
Privacy by design: eSignova is built with privacy-first principles:
Data residency: eSignova is hosted on secure cloud infrastructure. Data may be processed and stored in multiple geographic regions to ensure performance and redundancy.
Third-party vendors: We work with carefully vetted service providers for infrastructure, payment processing, and email delivery. All vendors are bound by confidentiality agreements and process data only as instructed.
Breach notification: In the event of a security incident affecting personal data, we will notify affected users and regulators as required by applicable law.
eSignova is designed to support compliance with electronic signature laws and data protection regulations:
Important: eSignova provides tools and controls to support compliance, but ultimate compliance responsibility rests with you. You are responsible for determining whether eSignova is appropriate for your specific compliance requirements and use cases.
Security documentation: We provide documentation on our security practices, architecture, and controls to support your due diligence and compliance needs.
Audit-ready reports: Pro Unlimited subscribers can generate one-click compliance reports that include envelope details, audit trails, verification records, and completion certificates.
Incident response: We maintain an incident response plan and will notify affected users of security incidents as required by law.
Questions? For security or compliance questions, contact our trust team at security@esignova.com.
PKI digital sealing, immutable audit trails, and vault archiving are included on all eSignova subscription tiers, from Essentials to Pro Unlimited.
View Pricing Plans ->