Security Features
Learn about SignNXT security
Security Overview
SignNXT is built with enterprise-grade security to protect your documents, signatures, and data. We implement industry-standard security practices and encryption to keep your information safe.
Authentication & Access Control
SignNXT uses industry-standard authentication and authorization to protect your account and data:
Account Security:
- Secure authentication with encrypted tokens
- Strong password requirements and hashing
- Automatic session management
- Secure password reset process
Access Control:
- Workspace-based isolation (complete separation between workspaces)
- Role-based permissions (Owner, Admin, Member)
- Document-level access control
- Folder permissions for team collaboration
Use a strong, unique password for your SignNXT account. We recommend using a password manager to generate and store complex passwords.
Data Encryption
All your data is protected with industry-standard encryption:
Encryption in Transit:
- All data transmitted using HTTPS/TLS encryption
- Enforced secure connections (no HTTP fallback)
- Protected login credentials, documents, and API requests
Encryption at Rest:
- Database encryption for all stored data
- Encrypted file storage for documents
- Secure password hashing (never stored in plain text)
- Time-limited secure access to files
SignNXT enforces HTTPS with strict security headers. Your browser will always use encrypted connections.
Web Security
SignNXT implements comprehensive security measures to protect against common web attacks:
Security Headers:
- Protection against clickjacking and iframe embedding
- XSS (Cross-Site Scripting) attack prevention
- MIME type sniffing protection
- Strict HTTPS enforcement
- Content Security Policy implementation
Application Security:
- Input validation and sanitization
- SQL injection prevention
- CSRF (Cross-Site Request Forgery) protection
- Secure error handling
- Rate limiting and abuse prevention
SignNXT follows OWASP security best practices and maintains high security ratings on industry-standard security scanners.
Document Security
Your documents are protected throughout their lifecycle:
Document Protection:
- Draft documents can be edited and modified
- Sent documents are locked to prevent tampering
- Unique, secure signing links for each signer
- Sequential signing enforcement (when enabled)
- Tamper-evident certificates of completion
Signing Security:
- Cryptographically secure signing tokens
- Time-limited document access (optional expiry)
- Email verification for signers
- Complete audit trail of all actions
- Signed PDF generation with timestamps
Once a document is sent, it becomes locked to prevent tampering. This ensures the integrity of the signing process.
Infrastructure Security
SignNXT's infrastructure is built with security best practices:
File Upload Security:
- PDF file type validation
- File size limits (25MB maximum)
- Secure cloud storage
- Time-limited access URLs
- Malware scanning capabilities
API Security:
- Comprehensive input validation
- Protection against injection attacks
- Secure error handling
- Rate limiting and abuse prevention
- Audit logging of all actions
Session Management:
- Secure session handling
- Automatic session expiration
- Protected authentication tokens
- CSRF protection
Monitoring & Incident Response
SignNXT maintains comprehensive security monitoring:
Security Monitoring:
- Continuous monitoring of security events
- Audit logging of all document actions
- Anomaly detection and alerting
- Regular security assessments
Incident Response:
- Dedicated security team
- 24-hour response time for critical issues
- Transparent communication
- Post-incident analysis and improvements
Security Best Practices
For All Users:
- Use strong, unique passwords (password manager recommended)
- Don't share your account credentials
- Log out on shared computers
- Verify sender identity before signing documents
- Report suspicious activity immediately
For Workspace Owners:
- Assign appropriate roles to team members
- Remove inactive members promptly
- Review member list regularly
- Use folder permissions for sensitive documents
- Enable certificate generation for important documents
- Set document expiry dates when appropriate
Following these best practices helps maintain the security of your workspace and documents.
Reporting Security Issues
If you discover a security vulnerability, please report it responsibly:
Contact Information:
- Email: hello@signnxt.com
- Subject: "Security Vulnerability Report"
- Include: Detailed description and steps to reproduce
Our Commitment:
- Acknowledge reports within 24 hours
- Investigate all reports promptly
- Keep you informed of progress
- Provide credit (if desired) after resolution
Please do not publicly disclose security vulnerabilities. Report them privately so we can address them before they can be exploited.
Security Features Summary
SignNXT implements comprehensive security across all layers:
✅ Authentication & Access Control
- Secure authentication system
- Role-based permissions
- Workspace isolation
- Session management
✅ Data Protection
- Encryption in transit and at rest
- Secure password storage
- Protected file storage
- Time-limited access
✅ Document Security
- Tamper-proof signing process
- Unique signing tokens
- Audit trail for all actions
- Certificate verification
✅ Compliance & Audit
- Comprehensive audit logging
- Data export and deletion capabilities
- Legal e-signature compliance
Was this page helpful?