- Electronic Signature
- Questions & Answers
- How to verify a signer’s identity when sending a document for signing
How to verify a signer’s identity when sending a document for signing?
The importance of multi-factor authentication
Along with reliable eSigning, it’s important to have your data protected from malware threats, hacking attacks, and identity theft.
Different platforms and applications use different methods to authenticate a user’s identity, including both single factor and multifactor authentication. Below are the most commonly used security measures you can use to protect your documents from unauthorized access:
- Dual factor authentication. Dual factor authentication is when your signer must securely log in one more time before accessing the document. This ensures that the signer is, in fact, the intended recipient of your document.
- Authentication timeout. The authentication timeout can be enabled so that your signer must re-login for every set period of time. This will ensure a higher level of security for your document and the sensitive information it may hold.
- Phone call authentication. You can protect access to a document by requiring authentication with a phone call. Once your document has been signed, you will receive an instant notification.
- Document password. Ensure that a recipient is the only person capable of viewing, editing, and signing your document by adding a password.
- Identity verification. Require your signer to use Touch ID on their mobile device or verify a signer’s identity using a photo.
- Advanced threat protection. Advanced threat protection is an enterprise-level feature that offers protection against complex malware or hacking attacks that target sensitive data within an organization.
Keep your data safe with signNow
signNow is an enterprise-level electronic signature app that provides you with a reliable and secure way to eSign your documents. It allows you to effectively manage your document-driven processes, such as collecting and distributing applications, closing contracts, and even filing taxes.
Follow the steps below to add an additional safeguard to your sensitive data by making a request for a signer’s authentication in signNow:
- Select a document from your device or cloud and upload it to signNow.
- Edit your document according to your needs before sending it for signing. Add necessary fillable fields (e.g., text, date/time, dropdowns, checkboxes, eSignature) and assign them to your signer(s).
- Click Invite to Sign to send the signature invitation, fill in the signers’ emails, create a customized message, and add a unique signing order.
- Click Advanced options to set advanced signer settings. Request signer authentication to ensure your document cannot be accessed by anyone other than your intended recipient.
- Choose the authentication method for your signer(s). It can be either password, phone call, or text message (SMS).
- Send your signature request.
The signer will receive an email inviting them to sign the document. He or she will also be required to authenticate themselves using the authentication method of your choice.
In a nutshell
To keep your sensitive data secure, take advantage of trusted software solutions. Check their security and encryption certificates before granting them access to your sensitive business documents.
By combining advanced threat protection, multi-factor authentication, and comprehensive audit trails, signNow provides its users with a reliable and secure way to eSign documents online. With signNow, you can always be sure that each document you edit, sign, and share is protected from unauthorized access and hacking attacks.
Automate business processes with the ultimate suite of tools that are customizable for any use case.
- Award-winning eSignature. Approve, deliver, and eSign documents to conduct business anywhere and anytime.
- End-to-end online PDF editor. Create, edit, and manage PDF documents and forms in the cloud.
- Online library of 85K+ state-specific legal forms. Find up-to-date legal forms and form packages for any use case in one place.