Security, compliance, and trust
Cover the controls and evidence needed for compliant document execution.
Outcomes
- Configure access protections and signer controls.
- Understand auditability and evidence.
- Apply data handling and regulatory settings.
Core tasks
- Enable Two Factor Authentication
- Device Lock
- The Audit Log
- GDPR: How to Set Data Retention
- GDPR: Delete a Signer (Data Subject)
- How to Use Qualified Electronic Signatures
- HMLR Compliant Signing and Witnessing