{"id":467,"date":"2025-12-29T06:54:09","date_gmt":"2025-12-29T06:54:09","guid":{"rendered":"https:\/\/volksample.com.au\/volksign\/?page_id=467"},"modified":"2026-01-21T06:29:02","modified_gmt":"2026-01-21T06:29:02","slug":"security","status":"publish","type":"page","link":"https:\/\/volksample.com.au\/volksign\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"467\" class=\"elementor elementor-467\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-890a5f7 e-flex e-con-boxed e-con e-parent\" data-id=\"890a5f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5335e98 e-con-full e-flex e-con e-child\" data-id=\"5335e98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4007813 elementor-widget elementor-widget-spacer\" data-id=\"4007813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e3d3cd e-con-full e-flex e-con e-child\" data-id=\"7e3d3cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-82f1b97 e-con-full e-flex e-con e-child\" data-id=\"82f1b97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d12f3e elementor-widget elementor-widget-heading\" data-id=\"0d12f3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get enterprise-grade security for your most sensitive agreements<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1409ab elementor-widget elementor-widget-text-editor\" data-id=\"d1409ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tWe take your agreements as seriously as you do, which is why Docusign meets the most stringent global security standards.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb17d4b e-con-full e-flex e-con e-child\" data-id=\"fb17d4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88897c2 elementor-widget elementor-widget-image\" data-id=\"88897c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"550\" height=\"550\" src=\"https:\/\/volksample.com.au\/volksign\/wp-content\/uploads\/2025\/12\/secure-doc-sending-918ad86e63.webp\" class=\"attachment-large size-large wp-image-470\" alt=\"\" srcset=\"https:\/\/volksample.com.au\/volksign\/wp-content\/uploads\/2025\/12\/secure-doc-sending-918ad86e63.webp 550w, https:\/\/volksample.com.au\/volksign\/wp-content\/uploads\/2025\/12\/secure-doc-sending-918ad86e63-300x300.webp 300w, https:\/\/volksample.com.au\/volksign\/wp-content\/uploads\/2025\/12\/secure-doc-sending-918ad86e63-150x150.webp 150w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3345867 e-con-full e-flex e-con e-child\" data-id=\"3345867\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4981bf elementor-widget elementor-widget-spacer\" data-id=\"e4981bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ea0756 elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"6ea0756\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-760095d elementor-widget elementor-widget-text-editor\" data-id=\"760095d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"718\" data-end=\"752\">1. Information Security Program<\/h2><h4 data-start=\"754\" data-end=\"792\">1.1 Information Security Program<\/h4><p data-start=\"793\" data-end=\"1221\">VolkSign maintains a comprehensive written information security program consisting of policies, standards, procedures, and related documentation that define the criteria, methods, and measures governing the processing and protection of Customer Content and the VolkSign systems or networks used to process or secure Customer Content (\u201cVolkSign Information Systems\u201d) in connection with providing the Services under the Agreement.<\/p><h4 data-start=\"1223\" data-end=\"1254\">1.2 Shared Responsibility<\/h4><p data-start=\"1255\" data-end=\"1663\">The security of data, including Customer Content accessed, stored, shared, or otherwise processed through VolkSign Services, is a shared responsibility between VolkSign and the Customer. VolkSign is responsible for implementing and operating its information security program, while the Customer is responsible for properly managing user access, permissions, and configuration of features within the Services.<\/p><h4 data-start=\"1665\" data-end=\"1700\">1.3 Personnel Confidentiality<\/h4><p data-start=\"1701\" data-end=\"1737\">VolkSign ensures that its personnel:<\/p><ul data-start=\"1738\" data-end=\"1925\"><li data-start=\"1738\" data-end=\"1832\"><p data-start=\"1740\" data-end=\"1832\">Are bound by confidentiality obligations that provide protection for Customer Content; and<\/p><\/li><li data-start=\"1833\" data-end=\"1925\"><p data-start=\"1835\" data-end=\"1925\">Receive appropriate training related to the processing and protection of Customer Content.<\/p><\/li><\/ul><h2 data-start=\"1932\" data-end=\"1955\">2. Security Controls<\/h2><p data-start=\"1957\" data-end=\"2115\">In accordance with its information security program, VolkSign implements commercially reasonable physical, organizational, and technical controls designed to:<\/p><ul data-start=\"2116\" data-end=\"2317\"><li data-start=\"2116\" data-end=\"2196\"><p data-start=\"2118\" data-end=\"2196\">Ensure the security, integrity, and confidentiality of Customer Content; and<\/p><\/li><li data-start=\"2197\" data-end=\"2317\"><p data-start=\"2199\" data-end=\"2317\">Protect Customer Content against anticipated threats, unauthorized access, accidental loss, alteration, or disclosure.<\/p><\/li><\/ul><h4 data-start=\"2319\" data-end=\"2343\">2.1 System Updates<\/h4><p data-start=\"2344\" data-end=\"2482\">VolkSign maintains processes to keep VolkSign Information Systems up to date with relevant upgrades, patches, bug fixes, and new versions.<\/p><h4 data-start=\"2484\" data-end=\"2503\">2.2 Firewalls<\/h4><p data-start=\"2504\" data-end=\"2606\">Firewalls are configured and maintained to protect Customer Content and VolkSign\u2019s non-public systems.<\/p><h4 data-start=\"2608\" data-end=\"2641\">2.3 Anti-Malware Protection<\/h4><p data-start=\"2642\" data-end=\"2829\">VolkSign uses up-to-date anti-malware and anti-virus solutions with automatic updates to mitigate risks from malicious software, including viruses, ransomware, spyware, and other threats.<\/p><h4 data-start=\"2831\" data-end=\"2857\">2.4 Security Testing<\/h4><p data-start=\"2858\" data-end=\"2998\">VolkSign regularly tests its security systems, processes, and controls to verify effectiveness and compliance with these Security Practices.<\/p><h4 data-start=\"3000\" data-end=\"3025\">2.5 Access Controls<\/h4><p data-start=\"3026\" data-end=\"3128\">VolkSign maintains access control policies governing personnel access to VolkSign Information Systems:<\/p><ul data-start=\"3130\" data-end=\"3509\"><li data-start=\"3130\" data-end=\"3186\"><p data-start=\"3132\" data-end=\"3186\">Unique user IDs are assigned to authorized personnel<\/p><\/li><li data-start=\"3187\" data-end=\"3255\"><p data-start=\"3189\" data-end=\"3255\">Access is limited to individuals with a legitimate business need<\/p><\/li><li data-start=\"3256\" data-end=\"3335\"><p data-start=\"3258\" data-end=\"3335\">Access rights are reviewed periodically and revoked when no longer required<\/p><\/li><li data-start=\"3336\" data-end=\"3409\"><p data-start=\"3338\" data-end=\"3409\">Strong password policies and multi-factor authentication are enforced<\/p><\/li><li data-start=\"3410\" data-end=\"3451\"><p data-start=\"3412\" data-end=\"3451\">Default system passwords are not used<\/p><\/li><li data-start=\"3452\" data-end=\"3509\"><p data-start=\"3454\" data-end=\"3509\">Credentials must remain confidential and are not shared<\/p><\/li><\/ul><h4 data-start=\"3511\" data-end=\"3538\">2.6 Security Policies<\/h4><p data-start=\"3539\" data-end=\"3648\">VolkSign enforces information security, confidentiality, and acceptable use policies and monitors compliance.<\/p><h4 data-start=\"3650\" data-end=\"3682\">2.7 Environment Separation<\/h4><p data-start=\"3683\" data-end=\"3798\">Development and testing environments are logically separated from production systems that process Customer Content.<\/p><h4 data-start=\"3800\" data-end=\"3825\">2.8 Secure Deletion<\/h4><p data-start=\"3826\" data-end=\"3973\">VolkSign follows industry-recognized standards, such as NIST SP 800-88, to ensure Customer Content is rendered unrecoverable before media disposal.<\/p><h4 data-start=\"3975\" data-end=\"3998\">2.9 Remote Access<\/h4><p data-start=\"3999\" data-end=\"4110\">Remote access to private VolkSign networks requires encrypted VPN connections with multi-factor authentication.<\/p><h4 data-start=\"4112\" data-end=\"4133\">2.10 Encryption<\/h4><p data-start=\"4134\" data-end=\"4340\">VolkSign uses industry-standard encryption consistent with recognized security frameworks to encrypt Customer Content both in transit and at rest. Only encrypted connections are permitted for data transfer.<\/p><h2 data-start=\"4347\" data-end=\"4373\">3. Use of Third Parties<\/h2><h4 data-start=\"4375\" data-end=\"4405\">3.1 Third-Party Security<\/h4><p data-start=\"4406\" data-end=\"4545\">Any third parties engaged by VolkSign are required to maintain security standards comparable to those outlined in these Security Practices.<\/p><h4 data-start=\"4547\" data-end=\"4569\">3.2 Data Hosting<\/h4><p data-start=\"4570\" data-end=\"4819\">VolkSign may use third-party cloud service providers to host and process Customer Content. Such providers maintain industry-standard physical and technical safeguards and conform to recognized security certifications such as ISO 27001 or equivalent.<\/p><p data-start=\"4821\" data-end=\"4842\">These providers must:<\/p><ul data-start=\"4843\" data-end=\"5047\"><li data-start=\"4843\" data-end=\"4880\"><p data-start=\"4845\" data-end=\"4880\">Maintain physical access controls<\/p><\/li><li data-start=\"4881\" data-end=\"4942\"><p data-start=\"4883\" data-end=\"4942\">Use environmental monitoring and fire suppression systems<\/p><\/li><li data-start=\"4943\" data-end=\"4986\"><p data-start=\"4945\" data-end=\"4986\">Restrict access to authorized personnel<\/p><\/li><li data-start=\"4987\" data-end=\"5047\"><p data-start=\"4989\" data-end=\"5047\">Maintain business continuity and disaster recovery plans<\/p><\/li><\/ul><p data-start=\"5049\" data-end=\"5133\">Annual independent audits and risk assessments are conducted for critical providers.<\/p><h2 data-start=\"5140\" data-end=\"5187\">4. Business Continuity and Disaster Recovery<\/h2><p data-start=\"5189\" data-end=\"5326\">VolkSign maintains a disaster recovery and business continuity program designed to restore Services following an incident. This includes:<\/p><ul data-start=\"5327\" data-end=\"5450\"><li data-start=\"5327\" data-end=\"5356\"><p data-start=\"5329\" data-end=\"5356\">Regular backup validation<\/p><\/li><li data-start=\"5357\" data-end=\"5394\"><p data-start=\"5359\" data-end=\"5394\">Annual review of critical systems<\/p><\/li><li data-start=\"5395\" data-end=\"5450\"><p data-start=\"5397\" data-end=\"5450\">Periodic testing and updates of recovery procedures<\/p><\/li><\/ul><h2 data-start=\"5457\" data-end=\"5481\">5. Security Incidents<\/h2><h4 data-start=\"5483\" data-end=\"5510\">5.1 Incident Response<\/h4><p data-start=\"5511\" data-end=\"5672\">VolkSign will notify Customers without undue delay upon confirmation of a Security Breach. Notifications will be sent to the Customer\u2019s registered contact email.<\/p><p data-start=\"5674\" data-end=\"5870\">VolkSign will investigate, contain, and remediate Security Breaches in accordance with its incident response procedures and provide relevant information to support Customer compliance obligations.<\/p><h4 data-start=\"5872\" data-end=\"5903\">5.2 Unsuccessful Attempts<\/h4><p data-start=\"5904\" data-end=\"6036\">Attempts that do not result in unauthorized access\u2014such as port scans or failed login attempts\u2014are not considered Security Breaches.<\/p><h4 data-start=\"6038\" data-end=\"6071\">5.3 Customer Responsibility<\/h4><p data-start=\"6072\" data-end=\"6247\">Security incidents caused by Customer misconfiguration, credential compromise, or unauthorized sharing of access are not considered Security Breaches attributable to VolkSign.<\/p><h4 data-start=\"6249\" data-end=\"6269\">5.4 Disclaimer<\/h4><p data-start=\"6270\" data-end=\"6366\">VolkSign\u2019s response to a Security Breach does not constitute an admission of fault or liability.<\/p><h2 data-start=\"6373\" data-end=\"6401\">6. Auditing and Reporting<\/h2><h4 data-start=\"6403\" data-end=\"6423\">6.1 Monitoring<\/h4><p data-start=\"6424\" data-end=\"6501\">VolkSign conducts ongoing monitoring, risk assessments, and security reviews.<\/p><h4 data-start=\"6503\" data-end=\"6531\">6.2 Independent Audits<\/h4><p data-start=\"6532\" data-end=\"6758\">Independent third-party audits may be conducted in accordance with recognized standards (such as SOC 2). Audit reports are treated as confidential and may be shared upon written request, subject to confidentiality obligations.<\/p><h4 data-start=\"6760\" data-end=\"6789\">6.3 Penetration Testing<\/h4><p data-start=\"6790\" data-end=\"6914\">VolkSign conducts regular penetration testing and vulnerability assessments performed by independent security professionals.<\/p><h2 data-start=\"6921\" data-end=\"6938\">7. Definitions<\/h2><ul data-start=\"6940\" data-end=\"7533\"><li data-start=\"6940\" data-end=\"7002\"><p data-start=\"6942\" data-end=\"7002\"><strong data-start=\"6942\" data-end=\"6955\">Agreement<\/strong> \u2013 The contract governing use of the Services<\/p><\/li><li data-start=\"7003\" data-end=\"7070\"><p data-start=\"7005\" data-end=\"7070\"><strong data-start=\"7005\" data-end=\"7017\">Customer<\/strong> \u2013 The individual or entity using VolkSign Services<\/p><\/li><li data-start=\"7071\" data-end=\"7156\"><p data-start=\"7073\" data-end=\"7156\"><strong data-start=\"7073\" data-end=\"7093\">Customer Content<\/strong> \u2013 Any data, documents, or materials uploaded to the Services<\/p><\/li><li data-start=\"7157\" data-end=\"7218\"><p data-start=\"7159\" data-end=\"7218\"><strong data-start=\"7159\" data-end=\"7170\">Process<\/strong> \u2013 Any operation performed on Customer Content<\/p><\/li><li data-start=\"7219\" data-end=\"7305\"><p data-start=\"7221\" data-end=\"7305\"><strong data-start=\"7221\" data-end=\"7240\">Security Breach<\/strong> \u2013 Unauthorized access, loss, or disclosure of Customer Content<\/p><\/li><li data-start=\"7306\" data-end=\"7389\"><p data-start=\"7308\" data-end=\"7389\"><strong data-start=\"7308\" data-end=\"7320\">Services<\/strong> \u2013 VolkSign\u2019s electronic signature and document management services<\/p><\/li><li data-start=\"7390\" data-end=\"7469\"><p data-start=\"7392\" data-end=\"7469\"><strong data-start=\"7392\" data-end=\"7414\">VolkSign Personnel<\/strong> \u2013 Authorized individuals processing Customer Content<\/p><\/li><li data-start=\"7470\" data-end=\"7533\"><p data-start=\"7472\" data-end=\"7533\"><strong data-start=\"7472\" data-end=\"7480\">User<\/strong> \u2013 Any authorized individual accessing the Services<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ead8ab elementor-hidden-widescreen elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra e-flex e-con-boxed e-con e-parent\" data-id=\"6ead8ab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e57e3b7 elementor-widget elementor-widget-text-editor\" data-id=\"e57e3b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"718\" data-end=\"752\">1. Information Security Program<\/h2><h3 data-start=\"754\" data-end=\"792\">1.1 Information Security Program<\/h3><p data-start=\"793\" data-end=\"1221\">VolkSign maintains a comprehensive written information security program consisting of policies, standards, procedures, and related documentation that define the criteria, methods, and measures governing the processing and protection of Customer Content and the VolkSign systems or networks used to process or secure Customer Content (\u201cVolkSign Information Systems\u201d) in connection with providing the Services under the Agreement.<\/p><h3 data-start=\"1223\" data-end=\"1254\">1.2 Shared Responsibility<\/h3><p data-start=\"1255\" data-end=\"1663\">The security of data, including Customer Content accessed, stored, shared, or otherwise processed through VolkSign Services, is a shared responsibility between VolkSign and the Customer. VolkSign is responsible for implementing and operating its information security program, while the Customer is responsible for properly managing user access, permissions, and configuration of features within the Services.<\/p><h3 data-start=\"1665\" data-end=\"1700\">1.3 Personnel Confidentiality<\/h3><p data-start=\"1701\" data-end=\"1737\">VolkSign ensures that its personnel:<\/p><p data-start=\"1740\" data-end=\"1832\">Are bound by confidentiality obligations that provide protection for Customer Content; and<\/p><p data-start=\"1835\" data-end=\"1925\">Receive appropriate training related to the processing and protection of Customer Content.<\/p><div>\u00a0<\/div><div>\u00a0<\/div><hr data-start=\"1927\" data-end=\"1930\" \/><h2 data-start=\"1932\" data-end=\"1955\">2. Security Controls<\/h2><p data-start=\"1957\" data-end=\"2115\">In accordance with its information security program, VolkSign implements commercially reasonable physical, organizational, and technical controls designed to:<\/p><p data-start=\"2118\" data-end=\"2196\">Ensure the security, integrity, and confidentiality of Customer Content; and<\/p><p data-start=\"2199\" data-end=\"2317\">Protect Customer Content against anticipated threats, unauthorized access, accidental loss, alteration, or disclosure.<\/p><h3 data-start=\"2319\" data-end=\"2343\">2.1 System Updates<\/h3><p data-start=\"2344\" data-end=\"2482\">VolkSign maintains processes to keep VolkSign Information Systems up to date with relevant upgrades, patches, bug fixes, and new versions.<\/p><h3 data-start=\"2484\" data-end=\"2503\">2.2 Firewalls<\/h3><p data-start=\"2504\" data-end=\"2606\">Firewalls are configured and maintained to protect Customer Content and VolkSign\u2019s non-public systems.<\/p><h3 data-start=\"2608\" data-end=\"2641\">2.3 Anti-Malware Protection<\/h3><p data-start=\"2642\" data-end=\"2829\">VolkSign uses up-to-date anti-malware and anti-virus solutions with automatic updates to mitigate risks from malicious software, including viruses, ransomware, spyware, and other threats.<\/p><h3 data-start=\"2831\" data-end=\"2857\">2.4 Security Testing<\/h3><p data-start=\"2858\" data-end=\"2998\">VolkSign regularly tests its security systems, processes, and controls to verify effectiveness and compliance with these Security Practices.<\/p><h3 data-start=\"3000\" data-end=\"3025\">2.5 Access Controls<\/h3><p data-start=\"3026\" data-end=\"3128\">VolkSign maintains access control policies governing personnel access to VolkSign Information Systems:<\/p><p data-start=\"3132\" data-end=\"3186\">Unique user IDs are assigned to authorized personnel<\/p><p data-start=\"3189\" data-end=\"3255\">Access is limited to individuals with a legitimate business need<\/p><p data-start=\"3258\" data-end=\"3335\">Access rights are reviewed periodically and revoked when no longer required<\/p><p data-start=\"3338\" data-end=\"3409\">Strong password policies and multi-factor authentication are enforced<\/p><p data-start=\"3412\" data-end=\"3451\">Default system passwords are not used<\/p><p data-start=\"3454\" data-end=\"3509\">Credentials must remain confidential and are not shared<\/p><h3 data-start=\"3511\" data-end=\"3538\">2.6 Security Policies<\/h3><p data-start=\"3539\" data-end=\"3648\">VolkSign enforces information security, confidentiality, and acceptable use policies and monitors compliance.<\/p><h3 data-start=\"3650\" data-end=\"3682\">2.7 Environment Separation<\/h3><p data-start=\"3683\" data-end=\"3798\">Development and testing environments are logically separated from production systems that process Customer Content.<\/p><h3 data-start=\"3800\" data-end=\"3825\">2.8 Secure Deletion<\/h3><p data-start=\"3826\" data-end=\"3973\">VolkSign follows industry-recognized standards, such as NIST SP 800-88, to ensure Customer Content is rendered unrecoverable before media disposal.<\/p><h3 data-start=\"3975\" data-end=\"3998\">2.9 Remote Access<\/h3><p data-start=\"3999\" data-end=\"4110\">Remote access to private VolkSign networks requires encrypted VPN connections with multi-factor authentication.<\/p><h3 data-start=\"4112\" data-end=\"4133\">2.10 Encryption<\/h3><p data-start=\"4134\" data-end=\"4340\">VolkSign uses industry-standard encryption consistent with recognized security frameworks to encrypt Customer Content both in transit and at rest. Only encrypted connections are permitted for data transfer.<\/p><hr data-start=\"4342\" data-end=\"4345\" \/><h2 data-start=\"4347\" data-end=\"4373\">3. Use of Third Parties<\/h2><h3 data-start=\"4375\" data-end=\"4405\">3.1 Third-Party Security<\/h3><p data-start=\"4406\" data-end=\"4545\">Any third parties engaged by VolkSign are required to maintain security standards comparable to those outlined in these Security Practices.<\/p><h3 data-start=\"4547\" data-end=\"4569\">3.2 Data Hosting<\/h3><p data-start=\"4570\" data-end=\"4819\">VolkSign may use third-party cloud service providers to host and process Customer Content. Such providers maintain industry-standard physical and technical safeguards and conform to recognized security certifications such as ISO 27001 or equivalent.<\/p><p data-start=\"4821\" data-end=\"4842\">These providers must:<\/p><p data-start=\"4845\" data-end=\"4880\">Maintain physical access controls<\/p><p data-start=\"4883\" data-end=\"4942\">Use environmental monitoring and fire suppression systems<\/p><p data-start=\"4945\" data-end=\"4986\">Restrict access to authorized personnel<\/p><p data-start=\"4989\" data-end=\"5047\">Maintain business continuity and disaster recovery plans<\/p><p data-start=\"5049\" data-end=\"5133\">Annual independent audits and risk assessments are conducted for critical providers.<\/p><hr data-start=\"5135\" data-end=\"5138\" \/><h2 data-start=\"5140\" data-end=\"5187\">4. Business Continuity and Disaster Recovery<\/h2><p data-start=\"5189\" data-end=\"5326\">VolkSign maintains a disaster recovery and business continuity program designed to restore Services following an incident. This includes:<\/p><p data-start=\"5329\" data-end=\"5356\">Regular backup validation<\/p><p data-start=\"5359\" data-end=\"5394\">Annual review of critical systems<\/p><p data-start=\"5397\" data-end=\"5450\">Periodic testing and updates of recovery procedures<\/p><div>\u00a0<\/div><hr data-start=\"5452\" data-end=\"5455\" \/><h2 data-start=\"5457\" data-end=\"5481\">5. Security Incidents<\/h2><h3 data-start=\"5483\" data-end=\"5510\">5.1 Incident Response<\/h3><p data-start=\"5511\" data-end=\"5672\">VolkSign will notify Customers without undue delay upon confirmation of a Security Breach. Notifications will be sent to the Customer\u2019s registered contact email.<\/p><p data-start=\"5674\" data-end=\"5870\">VolkSign will investigate, contain, and remediate Security Breaches in accordance with its incident response procedures and provide relevant information to support Customer compliance obligations.<\/p><h3 data-start=\"5872\" data-end=\"5903\">5.2 Unsuccessful Attempts<\/h3><p data-start=\"5904\" data-end=\"6036\">Attempts that do not result in unauthorized access\u2014such as port scans or failed login attempts\u2014are not considered Security Breaches.<\/p><h3 data-start=\"6038\" data-end=\"6071\">5.3 Customer Responsibility<\/h3><p data-start=\"6072\" data-end=\"6247\">Security incidents caused by Customer misconfiguration, credential compromise, or unauthorized sharing of access are not considered Security Breaches attributable to VolkSign.<\/p><h3 data-start=\"6249\" data-end=\"6269\">5.4 Disclaimer<\/h3><p data-start=\"6270\" data-end=\"6366\">VolkSign\u2019s response to a Security Breach does not constitute an admission of fault or liability.<\/p><hr data-start=\"6368\" data-end=\"6371\" \/><h2 data-start=\"6373\" data-end=\"6401\">6. Auditing and Reporting<\/h2><h3 data-start=\"6403\" data-end=\"6423\">6.1 Monitoring<\/h3><p data-start=\"6424\" data-end=\"6501\">VolkSign conducts ongoing monitoring, risk assessments, and security reviews.<\/p><h3 data-start=\"6503\" data-end=\"6531\">6.2 Independent Audits<\/h3><p data-start=\"6532\" data-end=\"6758\">Independent third-party audits may be conducted in accordance with recognized standards (such as SOC 2). Audit reports are treated as confidential and may be shared upon written request, subject to confidentiality obligations.<\/p><h3 data-start=\"6760\" data-end=\"6789\">6.3 Penetration Testing<\/h3><p data-start=\"6790\" data-end=\"6914\">VolkSign conducts regular penetration testing and vulnerability assessments performed by independent security professionals.<\/p><hr data-start=\"6916\" data-end=\"6919\" \/><h2 data-start=\"6921\" data-end=\"6938\">7. Definitions<\/h2><p data-start=\"6942\" data-end=\"7002\"><strong data-start=\"6942\" data-end=\"6955\">Agreement<\/strong> \u2013 The contract governing use of the Services<\/p><p data-start=\"7005\" data-end=\"7070\"><strong data-start=\"7005\" data-end=\"7017\">Customer<\/strong> \u2013 The individual or entity using VolkSign Services<\/p><p data-start=\"7073\" data-end=\"7156\"><strong data-start=\"7073\" data-end=\"7093\">Customer Content<\/strong> \u2013 Any data, documents, or materials uploaded to the Services<\/p><p data-start=\"7159\" data-end=\"7218\"><strong data-start=\"7159\" data-end=\"7170\">Process<\/strong> \u2013 Any operation performed on Customer Content<\/p><p data-start=\"7221\" data-end=\"7305\"><strong data-start=\"7221\" data-end=\"7240\">Security Breach<\/strong> \u2013 Unauthorized access, loss, or disclosure of Customer Content<\/p><p data-start=\"7308\" data-end=\"7389\"><strong data-start=\"7308\" data-end=\"7320\">Services<\/strong> \u2013 VolkSign\u2019s electronic signature and document management services<\/p><p data-start=\"7392\" data-end=\"7469\"><strong data-start=\"7392\" data-end=\"7414\">VolkSign Personnel<\/strong> \u2013 Authorized individuals processing Customer Content<\/p><p data-start=\"7472\" data-end=\"7533\"><strong data-start=\"7472\" data-end=\"7480\">User<\/strong> \u2013 Any authorized individual accessing the Services<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Get enterprise-grade security for your most sensitive agreements We take your agreements as seriously as you do, which is why Docusign meets the most stringent global security standards. 1. Information Security Program 1.1 Information Security Program VolkSign maintains a comprehensive written information security program consisting of policies, standards, procedures, and related documentation that define the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-467","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/pages\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":40,"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/pages\/467\/revisions"}],"predecessor-version":[{"id":1094,"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/pages\/467\/revisions\/1094"}],"wp:attachment":[{"href":"https:\/\/volksample.com.au\/volksign\/wp-json\/wp\/v2\/media?parent=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}