<aside> 📌 This page is dedicated to information on security and legal parameters

</aside>

OVERVIEW:

Veriscript takes security seriously. By utilizing SSL encryption and world-class secure server infrastructure, we keep your documents private and secure.

E-SIGN SERVICE:

An Aadhaar-holder is authorised to electronically sign a document online using eSign service.

The e-Sign service is facilitated by Application Service Providers like us (Veriscript), duly registered with CDAC (ESP) and in collaboration with the Unique Identification Authority of India (UIDAI).The Aadhaar- holder can affix his/her eSign on any electronic content by authenticating himself/herself through OTP received on their mobile number registered with Aadhaar. At the backend, the key pair is generated and a Digital Signature Certificate (DSC) is issued by the Certifying Authority (CA). Following this, the eSign is affixed to the document and returned back to the signer.

ENCRYPTION:

Your connection to Veriscript is secure and encrypted using SSL (Secure Sockets Layer). This is the same level of encryption used by leading banks and government agencies. Your documents are also stored and encrypted at rest using AES-256 bit encryption. Each one is encrypted with a unique key.

DATA SECURITY AS PER INTERNATIONAL ACCEPTED STANDARDS:

  1. 256-bit SSL encryption on all pages, including signing.
  2. Detailed audit log stored for each signature action.
  3. Identification of users verified before permitted to send documents
  4. Document integrity checked every step of the way
  5. Unique salted fingerprints for each document Secure storage of documents and data.
  6. Signatory identity verified via email address, phone number and geo-tracking.

Our platform has been CERT-IN certified and security audited.

All data stored and processed within Veriscript stays secured.  Our main infrastructure is hosted in the Amazon AWS data center in Mumbai. This region is also used by many of the top Internet companies and fully complies with all the major certifications. More information can be found here. https://aws.amazon.com/compliance/

We also have backup facilities in __________ which access is restricted to and is only used for data recovery or restoration. Backups are taken every _______ for both the database and the documents themselves. (You were to get back on this). Disaster recovery related details https://aws.amazon.com/disaster-recovery/

Data stored should be encrypted at rest and during transport. Data transport between internal systems should also be encrypted. The keys required to encrypt and decrypt the data should be stored in an HSM and restricted to the minimum number of required people. SSL is the service responsible for the security of data while being transferred from server to user or server to server. All the HSM related securities are managed by AWS itself. The link of the same is provided above.

DATA ACCESS: