Security that satisfies your compliance partner

Every signature on SealVow produces evidence that holds up to scrutiny — from the SRA, from opposing counsel, and from your own risk committee.

How we protect your documents

1

Forensic audit trail

Every event individually logged: document upload, email delivery, link click, document view, consent (verbatim text), signature applied, PDF download. Each entry includes IP address, user agent, and ISO 8601 timestamp.

2

Document integrity hash

SHA-256 hash computed at upload, before any signer accesses the document. Recorded immutably in the audit trail. Cryptographic proof that the signed document matches the original.

3

Encryption throughout

TLS 1.3 in transit, AES-256 at rest. Documents encrypted from upload to access. Key management via AWS KMS with automatic rotation.

4

UK data residency

All documents and audit data stored on AWS infrastructure in the UK (eu-west-2). Client data doesn't leave UK jurisdiction.

5

No third-party tracking

The signing experience contains no analytics, no tracking pixels, no third-party scripts. Your clients' data stays between your firm and them.

6

Legal recognition

Electronic signatures via SealVow are legally binding under the UK Electronic Communications Act 2000, EU eIDAS Regulation, and US ESIGN Act. Admissible as evidence with supporting audit certificate.

Compliance and legal recognition

eIDAS
EU Electronic Identification
ESIGN Act
US Federal
UK ECA 2000
UK Electronic Communications Act

Questions about security?

Our team is happy to walk through our security architecture with you.

Contact us