Fingerink takes security very seriously. With the use of SSL encryption and secure server infrastructure, Fingerink maintains the privacy and security of all of its documents.
Connection to Fingerink is secure and encrypted with SSL (Secure Sockets Layer). This is the same level of encryption used by the main banks and governmental agencies. Documents are also stored and encrypted using an AES algorithm – 256-bit encryption – each one with a unique code.
3. ELECTRONIC EVIDENCE
The audit trace file that is added to all of the executed signature requests includes an identifier that we can use to search the corresponding transaction register in our database. These registers include a hash of the document in PDF format that can be compared with the hash of a suspect PDF document to determine if it has been modified or manipulated.
The system used to store Fingerink documents is designed to achieve ‘nine’ 9s of durability and the data is automatically replicated across multiple data centres.
If you wish to correct, modify or delete any information on the site, you can change your personal preferences on the “Configuration” page or write to us at firstname.lastname@example.org.
6. CREDIT CARD INFORMATION
Fingerink does not store information from your credit card on its servers.
Fingerink complies with the ESIGN Act (2000 and UETA, 1999) of the United States, the Uniform Electronic Transactions Act (UETA), the European Union (Directive 1999/93/EC), the United Kingdom (UK Electronic Communication Act) and the rest of the member countries of the WTO (World Trade Organisation).
8. RESPONSIBLE DISCLOSURE POLICY
Fingerink regularly carries out security audits. If you believe that you have discovered a vulnerability, please report it to email@example.com and we can opt to add it to our error rewards programme.
9. COMMITMENT TO PRIVACY
Fingerink provides a transparent service in accordance with the most advanced international regulations on data protection.
- ELECTRONIC SIGNATURES: We do not store any signature made on our platform. Unique electronic signatures are generated for signing each document and in each transaction.
10. SERVER SECURITY AND AVAILABILITY
Documents are stored in an infrastructure made up of secure servers from globally recognised providers.