How data governance regulations and standards shape DocuSign’s rigorous security and privacy practices

Every e-signature provider seeks to keep confidential customer data secure throughout the e-signing process and ensure that the data remains accurate, complete, and consistently available to those authorised to access it. But what sets them all apart is their approach to data governance. DocuSign’s commitment to and significant ongoing investment toward protecting customer data extends to every operating environment across the DocuSign Agreement Cloud. In fact, information security and privacy are in our DNA and engrained in our people, processes, and technologies—globally.

How Data Governance Regulations and Standards Shape DocuSign’s Rigorous Security and Privacy Practices

Every e-signature provider seeks to keep confidential customer data secure throughout the e-signing process and ensure that the data remains accurate, complete, and consistently available to those authorised to access it. But what sets them all apart is their approach to data governance. DocuSign’s commitment to and significant ongoing investment toward protecting customer data extends to every operating environment across the DocuSign Agreement Cloud. In fact, information security and privacy are in our DNA and engrained in our people, processes, and technologies—globally. Our approach is simple: every employee is responsible for information security, including protecting:  –DocuSign-owned information assets –Customer and partner information assets –The underlying technology infrastructure and the data generated, processed, and stored in DocuSign environments

This document details DocuSign’s commitment to delivering robust data governance through specific policies and capabilities, rooted in an understanding of laws, regulations, standards, and best practices.

 

Best Practice Guidelines for Information Security & Records Management for Remote Workers

Organizations around the world are facing new and unparalleled challenges related to the COVID-19 pandemic. And whether employees work in a cubicle or from home, how you manage records and data is no different – everyone must comply with organizational policies.

Download Iron Mountain’s best practices guide for maintaining the security and privacy of your information during this unprecedented time.

An Enterprise Healthcare CISO’s Journey to Zero Trust

At Duo, success starts with our customers. As a healthcare Chief Information Security Officer (CISO), you’re responsible for identifying patient safety or care issues, while driving the selection and adoption decisions on technology purchases to help address those concerns.

We talked to the CISO of a large enterprise healthcare network with over 20,000 users, managing 60,000 devices – and serving the needs of over half a million patients a year.