Data Protection and Security

iinked Sign™ is committed to protecting your data.

Ensuring the security and privacy of your information, we have implemented a number of measures to ensure the highest level of security and compliance with industry standards.

ISO 27001 Certification

ISO 27001 Certification

Syngrafii's iinked Sign has successfully completed the ISO 27001 certification audit, confirming that our controls, protocols, and processes meet internationally recognized standards for security.

IAS Accreditation

IAS Accreditation

Syngrafii's iinked Sign holds accreditation from the International Accreditation Service (IAS), further validating that our adherence to rigorous international requirements meets industry standards.

Strong Data Encryption & Regulatory Compliance

All data, including signatures and documents, is encrypted during transmission and storage. The platform complies with industry standards to ensure legal and regulatory adherence.

OAuth-Based Authentication & Security

iinked Sign™ API utilizes the OAuth protocol for authorization, ensuring that API integrations adhere to high security standards by managing secure access and authentication.

Tamper-Proof Audit Trails & Document Integrity

Every signing activity is logged in an immutable audit trail, providing cryptographic proof of authenticity. Signed documents remain unaltered after signing, ensuring their integrity and compliance with legal requirements.

Secure Development & Testing Protocols

Syngrafii follows rigorous security protocols throughout development, staying up to date with known vulnerabilities and consistently applying security patches to maintain optimal platform protection.

Redundancy, Availability, and Uptime

We're committed to providing a highly available platform through the use of geographically redundant data centres with constant data backups. We ensure failovers exist at several levels to maximize uptime. Information about availability and outages can be found on our status page.

Security Testing

We conduct periodic audits of application security including third-party vulnerability and penetration testing to discover and address any identified vulnerabilities.

Cloud Security and Platform

We utilize a leading Infrastructure as a Service platform for global coverage and data residency requirements. The service being compliant to several leading regulatory standards.