Skip to main content

Evidence collection

Propper Sign captures comprehensive evidence for every signing transaction. This evidence is designed to provide legally defensible proof that satisfies the ESIGN Act, UETA, and eIDAS requirements. Evidence is collected automatically — no configuration is required.

Data collected

Identity and authentication

DataDescription
Participant nameFull name as entered when the agreement was configured or when the signer authenticates
Participant emailEmail address used to receive the signing invitation
RoleSigner, approver, or receives a copy
Authentication methodEmail verification or access code
Verification resultPass or fail, with attempt count

Access and device

DataDescription
IP addressCaptured per action (send, view, sign, complete)
TimestampUTC with timezone offset for every recorded event
GeolocationCity and region derived from IP address (not precise GPS)
Browser and OSUser agent string parsed to identify browser, operating system, and version
Why IP addresses matter

IP addresses provide digital location proof that is critical evidence in disputes. They serve as the electronic equivalent of witnessing a physical signature in person.

Document interaction

DataDescription
View timestampsWhen each document was first opened by each recipient
Tag valuesText entered, checkbox selections, and dropdown choices
Signature creation methodDrawn, typed, or uploaded signature image
Session durationTime spent in the signing session

Cryptographic hashes

SHA-256 hashes prove that documents have not been altered since signing:

  • Per-document hash — one hash per document in the agreement
  • Combined package hash — a single hash covering the entire agreement package
  • Field value hashes — hashes of tag values as entered

Collection timeline

Evidence is captured automatically at each stage of the agreement lifecycle:

  1. Sent — Sender identity, IP address, and timestamp recorded
  2. Delivered — Email delivery confirmation logged
  3. Viewed — Access timestamp, IP address, and device information captured
  4. Authenticated — Authentication method and verification result recorded
  5. Signed — Per-signature timestamp, IP address, and tag values captured
  6. Completed — Final timestamp and package hash recorded

Storage and security

PropertyDetails
ImmutabilityEvidence records cannot be modified after creation
Encryption in transitAll data is encrypted during transmission
Encryption at restStored data is encrypted at rest
RedundancyMulti-region backups
Retention policy

The retention period for evidence records is determined by your organization's policy. Propper Sign stores evidence for as long as your organization requires. Consult your organization's legal or compliance team for the appropriate retention period for your document types.

Viewing evidence

Navigate to Sign > Agreements > select an agreement > Audit tab, then click on any individual event to view its full evidence details.

Coming Soon

Screenshot: Evidence details panel showing action type, participant, timestamp, IP address, and authentication method

Each event detail view shows:

  • Action type and description
  • Participant name and email
  • Timestamp (UTC with timezone offset)
  • IP address
  • Authentication method and result (for signing events)

ESIGN Act (United States)

RequirementHow Propper Sign satisfies it
Intent to signExplicit sign action with confirmation screen
Consent to electronic recordsElectronic signature disclosure captured with timestamp
Signature-record associationSignature timestamp and document hash tied together
Record retentionEvidence stored per organizational policy

UETA (United States)

RequirementHow Propper Sign satisfies it
Electronic signature attributionIP address, timestamp, and authentication method link signature to signer
Record integritySHA-256 document hashes detect any alteration
Accessible format retentionAudit trail and certificate available for download at any time

eIDAS (European Union)

RequirementHow Propper Sign satisfies it
Uniquely linked to signatoryAuthentication method ties signature to the verified recipient
Capable of identifying the signatoryName, email, and authentication records included
Under sole signatory controlAccess controls and authentication enforce exclusivity
Detectable tamperingHash-chained audit trail and document hashes detect any modification

Privacy and data handling

Data not collected

Propper Sign does not collect:

  • Sensitive personal data (race, religion, or health information)
  • Financial details (unless present in the signed document content itself)
  • Precise GPS coordinates (geolocation is limited to city and region)

Access controls

  • Evidence is visible only to participants in the agreement and authorized organization members
  • Access to audit records is itself logged
  • Retention periods are configurable per organization

GDPR rights

Participants whose data is captured in the audit trail may:

  • Request a copy of their evidence
  • Request deletion after the applicable retention period has elapsed
  • Object to processing
  • Export their data in a machine-readable format
GDPR and anonymized records

When personal data is removed at a participant's request, anonymized audit records (without personally identifying information) may be retained to preserve the integrity of the audit chain.