Somerford Associates Limited

OneSpan Sign - Electronic Signature, eSign, Digital Signature

OneSpan Sign allows to securely approve, automate and eSign documents and forms using digital signatures in accordance with Trust Services and Electronic Identification (eIDAS). The platform is offered as ‘out-of-the-box’ application and as a tool for application developers to rapidly integrate e-signature functionality.


  • Ease to use from any device, Web and Mobile
  • Enforceable signing workflow, multiple authentication, signature methods, data capture
  • Optimised and responsive for mobile devices, offline capabilities
  • Extended white labelling. Users see your brand throughout the process
  • Advanced Security, documents tamper-evident sealed per signer
  • At 3 level audit trails: Signed Document, Summary, eWitness
  • Use out-of-box WebUI, drag-and-drop, templates and forms
  • Code once, deploy anywhere. RESTful API and SDK's
  • Hosted on redundant and resilient cloud infrastructures, deliver 99.9% uptime
  • Partnered with Amazon Web Services, IBM SoftLayer and MS Azure


  • Avoid business processes falling to paper when esignatures are required
  • Improve process efficiency, whilst maintaining control, real-time status
  • Improve compliance, records visibility, eliminate Not In Good Order
  • Improve experience for all users and stakeholders (senders, signers, developers).
  • Mobile support for obtaining / e-signing documents on the go
  • Flexible deployment for both internal use and external use cases
  • Scalable platform– without compromising performance or security
  • Increased automation in your workflows by adding e-signatures
  • Great stakeholder satisfaction for Citizens, partners and personnel


£9 to £12 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 5 7 6 4 3 6 9 6 0 0 0 0 2 2


Somerford Associates Limited Penny Harrison
Telephone: +44 1242 388168

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Pre-built connector to application such as Microsoft Sharepoint, Microsoft Office, Microsoft Dynamics SalesForce, SalesForce CPQ, Box, Nintex Workflow, Drawloop, Open Text Exstream, Selected IBM solutions. Laser Fiche, Pega Systems, selected Oracle Solution.
Can be integrated into any web and mobile application or core systems.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
99.9% availability
System requirements
User licence required for senders (not required for signers)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email or online ticketing , Customer Support Portal
In accordance with SLA
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
24x7 production issue support is included as part of the service
Support available to third parties

Onboarding and offboarding

Getting started
Very easy and intuitive to use and comes complete with walk thorough visual indication of next steps. Full online documentation and video's available.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Documents, data and evidence may be extracted via the API.
End-of-contract process
Service agreement typically stipulates that the customer is given a reasonable amount of time (months) to retrieve any data they require.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Responsive design , for small form devices
Service interface
Description of service interface
Onespan Sign WebUI is built using the Onespan Sign API.
The service OneSpan Sign provides a complete Electronic Signature Process Management platform for the Web, including preparing, distributing, reviewing, signing, and downloading documents. OneSpan Sign Application is the product's front end. Users, administrators, and integrators can interact with the Application using its GUI. Find more information
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Tests done with widely used screen reader (JAWS)
Confirm tags found in source documents remain available throughout e-signature process
Tests done with OS-provided assistive tools, e.g. zooming, high contrast color scheme
What users can and can't do using the API
ESignLive WebUI is built using the eSignLive API therefore all operations are accessible via the API. Additionally, extra features are available via the API that have not yet been implemented in the WebUI.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Complete customisation white labelling (branding). Extensive configuration of UI. Event notification service. Out-of-box usage or full integration using prebuilt connectors or API.


Independence of resources
Platform used has service elasticity. Additional resource such as CPU, RAM may be "dialed in" as required.


Service usage metrics
Metrics types
Number of transactions, documents, signers and status
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Documents, data and evidence may be extracted via the API.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • JSON
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • PDF
  • DOCX
  • Any format printable via Windows using OneSpan Sign print Driver.

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
IP ranges, whitelisting and blacklisting
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Strong 2FA access required

Availability and resilience

Guaranteed availability
Approach to resilience
Load is balanced between multiple nodes at every level: user interface, business logic & data;
Redundant power sources
Redundant connections to the Internet
Data is replicated in real time to geographically separate disaster recovery environment
Outage reporting
Publically available Trust Centre ( and customer notifications of any disruptions to service.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Questions & Answers, Knowledge Based Authentication, SMS code

There are 2 main user types that access the service:
SENDERS: Logon to the OneSpan Sign service to create, send and sign document packages.
SIGNERS: Notified by OneSpan Sign, use prescribed authentication step before viewing and eSigning documents.
Access restrictions in management interfaces and support channels
No access to management interfaces outside of OneSpan Sign employees
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Information security policies and processes
Onespan Sign has a comprehensive set of security policies and standards that includes a Corporate Information Security Policy, approved by Senior Management.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Internally developed Change Management Standard and Change Management Process.
Requests For Changes (RFCs) require formal Change Advisory Board (CAB) approval. CAB analysis and decisions are documented.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Information Security Director is responsible for ensuring that monitoring for vulnerabilities and threats
against the organization. Vulnerability assessments are to be performed on a weekly basis. Vulnerabilities are ranked (none to critical) and re-mediated accordingly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Internally developed Monitoring and logging standard. Additional measures implemented to comply with the requirements of Health Insurance Portability and Accountability Act (HIPAA).
All administrative accesses to the system are logged, as well as all Database accesses. Host intrusion detection systems are also in place on all hosts. Events are correlated centrally using a Security Incident and Events Management (SIEM) system. Reports are reviewed daily, and thresholds are set for alarms to be sent to 24/7 support personnel.
Incident management type
Supplier-defined controls
Incident management approach
The Information Security Incident Response Team (ISIRT) is responsible for receiving and
responding to computer security incident reports and activity. Once an event has been classified as an incident, the ISIRT assesses, contains and eradicates the source of the incident.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£9 to £12 a user a month
Discount for educational organisations
Free trial available
Description of free trial
We have both a Free and Trial Version. Our Trial version is for free for 30 days.
Our Developer test version is free
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.