Glemnet Ltd

DocuSign Electronic Encrypted Signature

Send encrypted electronic documents for approvals, agreements / transactions and DocuSign will complete the end-to-end online processes.

The ability to embed electronic signing and payment requests into your existing website, portals, and applications. Save time & money by using DocuSign’s pre-built integrations or APIs to connect your systems.


  • Limited and unlimited storage space depending on plan
  • Granular access User management
  • Files are encrypted using 256-bit Advanced Encryption Standard
  • 120 days of file recovery
  • Two-step verification if requiered
  • Active directory connector
  • Unlimited API access to platform partners
  • Enables HIPAA compliance
  • GDPR compliance


  • Access every file from any devices anywhere
  • Collaborate and share folders with your colleagues and clients
  • Easily recover deleted files and restore previous file versions.
  • Infrastructure cost reduction
  • Reduced bandwidth consumption
  • Lower support and training costs
  • Better employee productivity
  • More efficient collaboration


£1.68 to £26.00 per unit per month

Service documents


G-Cloud 11

Service ID

2 9 0 2 0 3 0 9 9 1 9 4 5 1 6


Glemnet Ltd

Karl Knight

0208 639 0230

Service scope

Software add-on or extension
What software services is the service an extension to
Microsoft Outlook add-on
Cloud deployment model
Public cloud
Service constraints
System requirements
RAM At least 512MB

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday - Friday: 9am - 5pm
Saturday and Sunday: 9am - 5pm
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
• Level 1 remote and telephone support provided by Glemnet service desk of all DocuSign problems.
• Escalation to DocuSign for Level 2 and 3 Incidents and Management thereof.
• 24/7 Availability.
• A dedicated Cloud Sales Specialist to provide consultancy, oversee complex projects and maintain a consistently high standard of customer service.
Support available to third parties

Onboarding and offboarding

Getting started
Glemnet will evaluate the environment and assist with the necessary information detail for your organisation to complete application. We will Process the application Assist with the deployment, Migration of the data and training the users
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
They can simply copy the information to local store drive
End-of-contract process
We require 90 days notice

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
What users can and can't do using the API
The DocuSign eSignature API lets you eSign documents, request signatures, automate your forms and data, and much more. You can integrate the eSignature REST and SOAP APIs into any app, website, or embedded system that can make https requests.
There is no limitation on the number of users.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available
Description of customisation
If you’re a DocuSign administrator, you have access to features that allow you to customise security, user profiles and add your logo for your organisation to externally shared links.


Independence of resources
The size of a shared folder will be counted against the quota of every member of that folder, unless everyone is a member of the same Dropbox Business account. For Business accounts, the size of the shared folder will be counted against the team's shared quota only once.


Service usage metrics


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
They can simply download it to a local drive
Data export formats
Other data export formats
Blob Object base
Data import formats
Other data import formats
Blob object based

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Local content is downloaded and saved on the hard drive of your computer. You can directly edit these files from applications on your computer.
Approach to resilience
Local content is downloaded and saved on the hard drive of your computer. You can directly edit these files from applications on your computer.
Outage reporting
Email Alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
No exclusions
ISO 28000:2007 certification
Who accredited the ISO 28000:2007
On request
ISO 28000:2007 accreditation date
On request
What the ISO 28000:2007 doesn’t cover
On request
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Available on request
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request
Incident management type
Supplier-defined controls
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£1.68 to £26.00 per unit per month
Discount for educational organisations
Free trial available
Description of free trial
30 days
Link to free trial

Service documents

Return to top ↑