Docstrail is designed as a secure, enterprise-grade online document signing and management platform. We prioritize the confidentiality, integrity, and availability of customer data and implement strong technical and organizational safeguards across our infrastructure, applications, and processes.
1. Data Security
All customer data stored within Docstrail is encrypted at rest using industry-standard encryption algorithms. Data transmitted between users and our systems is protected using secure, encrypted communication protocols (TLS/HTTPS), ensuring data confidentiality during transit.
Documents, signatures, and metadata are logically isolated per user and organization to prevent unauthorized access.
2. Infrastructure Security
Docstrail is hosted on Amazon Web Services (AWS) infrastructure located in the United States (US region). AWS provides a highly secure and resilient cloud environment with multiple layers of physical and operational security, including controlled data center access, continuous monitoring, and redundancy.
We leverage AWS security best practices for network segmentation, firewall protection, and secure server configuration.
3. Application Security
Our application is built following secure development best practices, including:
- Role-based access control (RBAC)
- Secure authentication and session management
- Protection against common web vulnerabilities
- Continuous monitoring and logging of system activity
Access to sensitive systems and data is restricted to authorized personnel only.
4. Digital Signature Integrity
Docstrail ensures the integrity of electronic signatures by:
- Binding signatures to the signed document
- Maintaining tamper-evident audit trails
- Recording signer identity, timestamps, and document activity
Any modification to a signed document invalidates the signature, ensuring document authenticity and non-repudiation.
5. Payments Security
All payment transactions are securely processed by Stripe, a PCI-DSS compliant payment processor. Docstrail does not store or handle full payment card information on its servers.
6. Access Control and Monitoring
We implement strict access controls, including least-privilege principles, to ensure only authorized users can access systems and data. System activity is logged and monitored to detect suspicious or unauthorized behavior.
7. Data Backup and Availability
Regular backups are performed to protect against data loss. Backup data is encrypted and stored securely, ensuring business continuity and disaster recovery readiness.
8. Compliance and Privacy
Docstrail aligns its security practices with applicable data protection and privacy regulations, including GDPR and the India Digital Personal Data Protection Act (DPDP Act). Our security controls support compliance requirements for enterprise and international customers.
9. User Responsibility
While Docstrail implements strong security controls, users are responsible for maintaining the confidentiality of their account credentials and ensuring proper access permissions within their organization.
10. Security Updates and Improvements
We continuously review and enhance our security controls to address evolving threats, improve resilience, and maintain trust with our users.
11. Contact
For security-related questions or to report a vulnerability, please contact:
Docstrail Security Team
Email: support@docstrail.com
