ZapSignTrust Center
Ask a question

ZapSign - Electronic Signature

Streamline your company's signature collection process. Create, send, and sign documents, always with legal validity. Save time, paper, and money!

security@zapsign.com.brPrivacy Policy

Compliance

ISO 27001:2013

ISO 27001:2013

ISO 27001:2022

ISO 27001:2022

Resources

Penetration Test

Information Security Policy (AUP)

Code of Conduct

Information Security Roles and Responsibilities

Asset Management Policy

Access Control Policy

Data Management Policy

Physical Security Policy

Human Resource Security Policy

Third-Party Management Policy

Controls

Infrastructure security

Information security for use of cloud services

Information transfer

Privileged access rights

+ 12 more

Organizational security

Determining the scope of the information security

Return of assets

Intellectual property rights

+ 16 more

Product security

Secure coding

Security testing in development and acceptance

Separation of development, test and production

+ 1 more

Internal security procedures

ICT readiness for business continuity

Information backup

Planning of Changes

+ 38 more

Data collected

Customer personally identifiable information

Personal health information

Payment Related Information

Subprocessors

Confluence

Confluence

Documentation and information central-based learning.

GitHub

GitHub

Repository and CI/CD management. Used to create deploy pipeline by github actions.

Google Drive

Google Drive

Cloud-based file storage and synchronization service, that allows managing documents into different devices.

Google Workspace

Google Workspace

Core platform to integrate users into a company mode, access to google services including Gmail, Drive, Meet and much more.

FAQ

Do you encrypt data at rest?

Yes, all data is encrypted at rest using industry-standard encryption protocols.

Do you support Single Sign-On (SSO)?

Yes, we support SSO integration through various identity providers.

Where are your servers located?

Our servers are located in secure data centers with redundant infrastructure.

In the event of a security incident affecting the integrity of a Clients data, what is the SLA for data recovery and service restoration?

We have comprehensive incident response procedures and recovery plans in place with defined SLAs based on incident severity.