Integritet och säkerhet

För oss på GetAccept är skydd för din och dina kunders data inte en eftertanke - det är en grundprincip som genomsyrar hela vår plattform. Här kan du läsa mer om hur vi skyddar dina uppgifter.

Bolag över hela världen litar på GetAccept

Engie_Original-1 Samsung_Dark Puma_Dark Preem_Dark Siemens_Dark Chagebee_Dark
Översikt

En snabb överblick

GetAccept är byggt för att hantera krav på skydd och säkerhet på enterprise-nivå. Vi möter globala standarder, från GDPR och SOC 2 till eIDAS, så att du kan vara trygg med att din data är skyddad.

Funktioner som skyddar din data

  • Rollbaserad behörighet

    Rollbaserad behörighet

    Kontrollera användares åtkomst med rollbaserade behörigheter som överensstämmer med era interna säkerhetspolicys.

  • SCIM

    SCIM

    Effektiv användarhantering i dina IT-system med automatiserad tilldelning och återkallande av tillgång för användare.

  • Multifaktorautentisering

    Multifaktorautentisering

    Skydda era konton ytterligare med MFA för både interna användare och externa mottagare.

  • Single Sign-On (SSO)

    Single Sign-On (SSO)

    Integrera ert befintliga autentiseringssystem för att förenkla användarhantering och åtkomstkontroll. Vi stödjer alla SAML SSO lösningar (som Azure, Okta, OneLogin) och Google SSO.

  • Lagring av data

    Lagring av data

    Säkerställ att data lagras korrekt och raderas i tid i enlighet med era policys för lagring av data.

Varje bolag hanterar data på olika sätt. Ska vi snacka detaljer?

GDPR & CCPA

Designat för GDPR & CCPA

GetAccept är designat med ett “privacy-first mindset” så att din data och dina uppgifter behandlas och lagras i enlighet med EUs GDPR-förordning och Kaliforniens CCPA-förordning. I GetAccept kan du hantera samtycke, upprätthålla rättigheter, och implementera de åtgärder för dataskydd som ni behöver.

Säker användning av AI

Din data lämnar aldrig GetAccept

Vi gillar säker användning av AI. Därför ser vi till att din data aldrig lämnar plattformen och aldrig delas med tredjepartstjänster som OpenAI, Anthropic eller Google.

  • Data delas aldrig med OpenAI eller andra externa leverantörer

  • Din data används aldrig för att träna LLMs

  • Anpassat för att möta GDPR- och SOC 2-krav

eIDAS & UETA

Avancerad och Kvalificerade elektroniska underskrifter (AdES och QES)

Elektroniska underskrifter i GetAccept följer alltid kraven i eIDAS-förordningen. Oavsett om du behöver enkla, avancerade, eller kvalificerade elektroniska underskrifter garanterar vi juridiskt bindande underskrifter.

Plattformssäkerhet

Plattformssäkerhet och SOC 2-certifiering

GetAccept är byggt på en stabil, skalbar infrastruktur och designad för 100% tillgänglighet. Vi har full backup, full kryptering och gör årliga penetrationstester för att säkra data mot alla möjliga hot.

  • Kryptering: ECDSA 256 & AES 256

  • Noggrant utvalda subprocessors

  • SOC 2-certifiering och årliga revisioner

  • Regelbunden utbildning av vår personal

Infrastruktur och nätverk

Alla våra system körs på uppdaterade Linux-servrar och skyddade molntjänster (t.ex. Amazon RDS, S3). Vi levererar säker och pålitlig prestanda för att möta era krav.

Lagring och skydd av data

Din data lagras och skyddas på säkra platser. Varje lagringsplats är krypterad med AES-256 och skyddad av avancerad nyckelhantering för att säkerställa konfidentialitet och integritet.

Reglerad åtkomst

GetAccept tillämpar strikta åtkomstkontroller. Våra team får endast de behörigheter de behöver, för att minimera risker och säkerställa att de följer våra strikta säkerhetsprotokoll.

Separata nätverk

Våra produktionssystem är isolerade från företags-, QA- och utvecklingsnätverk. Denna separation säkerställer att varje miljö fungerar oberoende och säkert.

Hantering av betalningsuppgifter

För betalningar samarbetar GetAccept med pålitliga tredjepartsleverantörer. Vi lagrar eller behandlar aldrig känsliga kortuppgifter.

Övervakning

Vi övervakar alla applikationer och all infrastruktur dygnet runt. Automatiserade system upptäcker avvikelser och eskalerar varningar till vårt jourteam för snabba åtgärder vid säkerhetsincidenter.

Tillgänglighet

Vi säkerställer kontinuerlig service med hjälp av automatisk skalning, lastbalansering och rullande distributioner. Dagliga, krypterade säkerhetskopior av databasen erbjuder robust skydd och tillförlitlig dataåterställning.

Tester

Vår utvecklingscykel omfattar noggranna säkerhetstester med avancerade verktyg och skanningar. Vi identifierar och åtgärdar proaktivt sårbarheter innan vi implementerar nya funktioner.

Systemarkitektur

GetAccept är byggt på en flerskiktad design som separerar frontend-, logik- och databaslager. Denna DMZ-liknande struktur säkerställer att varje lager är oberoende från varandra.

Läs mer om vårt säkerhetsarbete

GetAccept | Our privacy policy

Vår integritetspolicy

We take your safety seriously. Read GetAccept's privacy policy here! GetAccept helps clients close more deals by sending personalized content.

Läs mer
GetAccept | Data Processing Agreement

Personuppgiftsbiträdesavtal

Utforska vårt personuppgiftsbiträdesavtal för att se hur vi på ett säkert sätt hanterar, behandlar och skyddar dina data med full transparens och strikta...

Läs mer
Electronic eSignature Guide | GetAccept eSignature Hub

Elektroniska signaturer och eIDAS

What is an electronic signature? Learn how e-signatures work, why they’re secure and legal, and how they help you close deals faster.

Läs mer
book_a_demo_screen_1.5x

Få svar på dina säkerhetsfrågor

Skicka in formuläret så hör vårt team av sig för att diskutera dina säkerhetsbehov och säkerställa efterlevnad för ditt företag.

Dataskyddsförordningen, GDPR

GDPR is EU Regulation on data protection and privacy (personal data).

The regulation is implemented in all local privacy laws across the entire EU and EEA region. It will apply to all companies selling to and storing personal information about citizens in Europe, including companies on other continents. It provides citizens of the EU and EEA with greater control over their personal data and assurances that their information is being securely protected across Europe.

What counts as personal data?

According to the GDPR directive, personal data is any information related to a person such as a name, a photo, an email address, bank details, updates on social networking websites, location details, medical information, or a computer IP address.

What does it mean?

GDPR contains several requirements that benefit consumers by requiring increased control and transparency related to the personal data collected by organizations. At the same time, there are significant fines for infringements - up to 4% of global revenue or a maximum of EUR 20 million. Important differences to the previous privacy policy are that it includes much stronger terms for consent and obligations for data processors and data collectors, where mandatory contract terms between the parties are required.

Privacy by Design

GetAccept is built from the ground up to incorporate the principles of data protection and privacy through design (Privacy by Design).

Your rights under GDPR

The right to access –this means that individuals have the right to request access to their personal data and to ask how their data is used by the company after it has been gathered. The company must provide a copy of the personal data, free of charge and in electronic format if requested.

  • The right to be forgotten – if consumers are no longer customers, or if they withdraw their consent from a company to use their personal data, then they have the right to have their data deleted.
  • The right to data portability – Individuals have a right to transfer their data from one service provider to another. And it must happen in a commonly used and machine readable format.
  • The right to be informed – this covers any gathering of data by companies, and individuals must be informed before data is gathered. Consumers have to opt in for their data to be gathered, and consent must be freely given rather than implied.
  • The right to have information corrected – this ensures that individuals can have their data updated if it is out of date or incomplete or incorrect.
  • The right to restrict processing – Individuals can request that their data is not used for processing. Their record can remain in place, but not be used.
  • The right to object – this includes the right of individuals to stop the processing of their data for direct marketing. There are no exemptions to this rule, and any processing must stop as soon as the request is received. In addition, this right must be made clear to individuals at the very start of any communication.
  • The right to be notified – If there has been a data breach which compromises an individual’s personal data, the individual has a right to be informed within 72 hours of first having become aware of the breach.

Data Processing Agreement (DPA)

The GDPR states specific demands for agreements between Data Controllers and their Data Processors that are used to process the personal data that they are in control of. These agreements are called Data Processing Agreements and should always be handled if data is shared with third parties. You can find GetAccepts standard DPA here.

Schrems II and the SCC

On 16 July 2020, the Court of Justice of the European Union (ECJ) in its case called “Schrems II”) changed the way data can be transferred to a third country outside of EU, invalidated the old EU-US Privacy Shield. The Commission’s Standard Contractual Clauses (SCC) are valid as a transfer mechanism but require additional security measures and transfer impact assessments (see below). GetAccept has the latest SCCs in place with all sub processors. For more detailed information on the latest initiatives and our view of the EU - US data transfer topic please contact us.

Transfer impact Assessment (TIA)

GetAccept has conducted Transfer Impact Assessment on its data transfers. For a copy of our Assessment please reach out to us on legal@getaccept.com.

Contact information

If you have any questions or suggestions regarding our policies or practices, please contact us at legal @getaccept.com. We are always happy to discuss!

Plattformssäkerhet

GetAccept is built on a stable, redundant and scalable infrastructure and designed for 100% uptime. We have backups, full encryption and conduct yearly penetration tests to secure data against all possible threats. No system is better than the persons working on it and we provide regular security training to our staff and have among other things implemented a segregation of duties and least privilege access principles in the organization.

SOC2

System and Organization Control (SOC) 2 is a report based on the Auditing Standards Board of the American Institute of Certified Public Accountants' (AICPA) existing Trust Services Criteria (TSC). The purpose of the report is to evaluate an organization’s information systems relevant to security, availability, processing integrity, confidentiality, and privacy.

GetAccept undergoes a yearly rigorous audit conducted by a reputable certified third party auditor to certify the GetAccept services against this standard. The audit firm evaluates if GetAccept compliance controls are designed appropriately and if they are effectively operational.

The latest SOC 2 type 2 report may be requested by reaching out to our support. Potential customers can reach out to sales for more information.

Encryption and additional security measures

We encrypt our data in transit using ECDSA 256 (a 3072bit equivalent SSL/TLS certificate) and we encrypt our data in rest using the industry-standard AES-256. Read more about GetAccepts additional security measures here.

Data Storage

GetAccept only uses trusted and a select few sub processors that stores data. The sub-processors are assessed continually. Read more about the sub processors in our DPA.

Privacy

In general, the Personal Information you provide to us is used to help us communicate with you better. GetAccept takes your privacy seriously and will never share your personal information with any third party other than what is stated in our privacy policy. Read more here Privacy Policy.

Lagar och standarder för elektroniska signaturer

GetAccept provides you with a legally binding eSignature solution for your agreements and contracts. GetAccept complies with the requirements of the U.S. Electronic Signature in Global and National Commerce Act of 2000 (ESIGN), the Uniform Electronic Transactions Act (UETA), and the European Union eIDAS (EU No.910/2014) regarding electronic signatures and transmissions, which makes eSignatures fast, easy, and legally binding.

E-signature Law in the United States

GetAccept’s electronic signature solution in the United States complies with the definition of an electronic signature under the Electronic Signatures in Global and National Commerce (ESIGN) and the Uniform Electronic Transactions Act (UETA).

E-signature Law in the United Kingdom

In the United Kingdom, the equivalent legislation to the ESIGN Act in the United States is the Electronic Communications Act 2000. GetAccepts electronic signature solution complies with the definition of an electronic signature under this act.

E-signature Regulation in the European Union

In 2014, the European Parliament created a more uniform market for electronic transactions with the release of the EU Regulation No 910/2014 on electronic identification and trust services for electronic transactions in the internal market, also known as eIDAS. Electronic signatures are actively being used in Europe, and GetAccept’s eSignatures are compliant with eIDAS and EU electronic signature technical standards. You can read more about eIDAS below.

Signature authentication

GetAccept authenticates document signers so there is 100% transparency as to who is signing your documents. To protect all GetAccept user accounts, user information is transferred over 256-bit SSL encryption, including sensitive information like usernames and passwords. GetAccept also prevents others from accessing or using your account by imposing automated session time-outs and emailing you every time a contract is sent to, received by, or signed using an account.

Signature affixation

Each signature on a contract is imposed and affixed to the contract. GetAccept creates a comprehensive transaction trail between signing parties. To provide transaction history, we track and timestamp various information from the moment the document is submitted for signature to when it is completely signed and secured.

Full evidence log

A complete evidence log is a crucial factor to confirm when choosing an eSignature provider. Every send-out has a unique ID that reflects the contents of the document. GetAccept tracks the entire process and compiles it into a complete history of every action taken inside the document. Activities are marked with a trusted timestamp, email, IP number, and IP location.

Court-admissible transactions log 

GetAccept creates a comprehensive transaction trail between signing parties. In order to provide this transaction history, we track and timestamp various information from the moment the document is submitted for signature to when it is completely signed and secured, such as IP information and UserAgent information. To ensure against any tampering with your transaction log, the transaction log is secured with hashing technology. This audit trail gives you a full evidence log to bring to court should any conflicts arise.

 

Electronic signatures and eIDAS

eIDAS is an EU regulation on electronic identification and trust services for electronic transactions that applies as law within the whole of the EU.

Electronic Identification, Authentication and Trust Services (eIDAS)

The goal of the eIDAS regulation, which started in 2014, is to facilitate the flow of commerce in the EU through transparency, security, technical neutrality, cooperation, and interoperability. In pursuit of these values, eIDAS:

  • Standardizes the use of electronic identification (eID)
  • Defines a new class of “electronic trust services” (eTS)
  • Clarifies and ensures the legal validity of electronic signatures
  • Creates a European internal market within the EU for electronic trust services

Different levels of electronic signatures

The eIDAS regulation defines three types of electronic signatures: (Basic) Electronic Signature, Advanced Electronic Signature, and Qualified Electronic Signature. According to eIDAS, an electronic signature is defined as “data in electronic form which is attached to or logically associated with other data in electronic form and is used by the signatory to sign”.

Basic electronic signature

A basic electronic signature can be any kind of signature made in an electronic and digital environment, where the signatory has manifested their intent (e.g. by clicking a button or checking a box) to become bound by the contents of the document signed.

GetAccepts standard "click to sign" solution is considered a very strong Basic electronic signature and sufficient for most business agreements.

Advanced electronic signature (AdES)

According to eIDAS, an advanced electronic signature shall meet the following requirements:

  1. uniquely linked to and capable of identifying the signatory;
  2. created in a way that allows the signatory to retain control;
  3. linked to the document in a way that any subsequent change of the data is detectable.

These elements of unique identity, control, and integrity of the signed document can be achieved through different means. A recognized eID assures secure authentication of the signatory’s identity in the online environment.

GetAccept has multiple ways of creating a Advanced Electronic Signature, for instance with the use of a eID or MFA solution.

Qualified electronic signature (QES)

According to eIDAS, “‘qualified electronic signature’ means an advanced electronic signature that is created by a qualified electronic signature creation device, and is based on a qualified certificate for electronic signatures.” The use of Qualified Electronic Signatures includes an extra layer of assurance and trust that results in a special legal effect that shall be recognized by courts in the EU.

From a legal perspective QES should in EU be equivalent to a "wet ink" signature and the burden of proof in a court is on the challenger.

GetAccept has thru an external partnership the possibility to offer QES seamlessly integrated into the signing workflow in most European countries.  It should be noted that QES add a extra level of security but also complexity and cost to the signature flow.

Please contact us for more detailed information on QES.