Who can access your documents
Access model
Only authenticated users and within workspace can access data, based on roles and permissions.
Roles and permissions
User access is controlled through roles and access rules, to ensure the correct and secure use of documents within the organization.
External recipients
Signature recipients can access only the document shared with them and only for the duration of the request.
Audit logs
Key actions (create, view, send, sign) are logged for traceability. This supports compliance and internal audits.
Best practices
-
Use role‑based access.
-
Review permissions regularly.
-
Remove access when staff leave.