Somerford Associates Limited

OneSpan Sign

OneSpan Sign allows to securely approve, automate and eSign documents and forms using digital signatures in accordance with eIDAS. The platform is offered as ‘out-of-the-box’ application and as a tool for application developers to rapidly integrate e-signature functionality. It can run on your preferred cloud or onsite.


  • Ease to use from any device, Web and Mobile
  • Enforceable signing workflow, multiple authentication, signature methods, data capture
  • Optimised and responsive for mobile devices, offline capabilities.
  • Extended white labelling. Users see your brand throughout the process
  • Advanced Security, documents tamper-evident sealed per signer
  • At 3 level audit trails: Signed Document, Summary, eWitness
  • Use out-of-box WebUI, drag-and-drop, templates and forms
  • Code once, deploy anywhere. RESTful API and SDK's
  • Hosted on redundant and resilient cloud infrastructures, deliver 99.9% uptime
  • SOC 2 Type II certified; Report at


  • Avoid business processes falling to paper when esignatures are required
  • Improve process efficiency, whilst maintaining control, real-time status
  • Improve compliance, records visibility, eliminate Not In Good Order
  • Improve experience for all users and stakeholders (senders, signers, developers).
  • Mobile support for obtaining / e-signing documents on the go
  • Flexible deployment for both internal use and external use cases
  • Scalable platform– without compromising performance or security
  • Increased automation in your workflows by adding e-signatures
  • Great stakeholder satisfaction for Citizens, partners and personnel


£9 to £12 per user per month

Service documents

G-Cloud 11


Somerford Associates Limited

Penny Harrison

+44 1793 698 047

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Pre-built connector to application such as Microsoft Sharepoint, Microsoft Office, Microsoft Dynamics SalesForce, SalesForce CPQ, Box, Nintex Workflow, Drawloop, Open Text Exstream, Selected IBM solutions. Laser Fiche, Pega Systems, selected Oracle Solution.
Can be integrated into any web and mobile application or core systems.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints 99.9% availability
System requirements User licence required for senders (not required for signers)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email or online ticketing , Customer Support Portal
In accordance with SLA
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 24x7 production issue support is included as part of the service
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Very easy and intuitive to use and comes complete with walk thorough visual indication of next steps. Full online documentation and video's available.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Documents, data and evidence may be extracted via the API.
End-of-contract process Service agreement typically stipulates that the customer is given a reasonable amount of time (months) to retrieve any data they require.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Responsive design , for small form devices
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing Tests done with widely used screen reader (JAWS)
Confirm tags found in source documents remain available throughout e-signature process
Tests done with OS-provided assistive tools, e.g. zooming, high contrast color scheme
What users can and can't do using the API ESignLive WebUI is built using the eSignLive API therefore all operations are accessible via the API. Additionally, extra features are available via the API that have not yet been implemented in the WebUI.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Complete customisation white labelling (branding). Extensive configuration of UI. Event notification service. Out-of-box usage or full integration using prebuilt connectors or API.


Independence of resources Platform used has service elasticity. Additional resource such as CPU, RAM may be "dialed in" as required.


Service usage metrics Yes
Metrics types Number of transactions, documents, signers and status
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold Onespan

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach SOC2
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Documents, data and evidence may be extracted via the API.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • JSON
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • PDF
  • DOCX
  • Any format printable via Windows using OneSpan Sign print Driver.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks IP ranges, whitelisting and blacklisting
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network Strong 2FA access required

Availability and resilience

Availability and resilience
Guaranteed availability 99.9%
Approach to resilience Load is balanced between multiple nodes at every level: user interface, business logic & data;
Redundant power sources
Redundant connections to the Internet
Data is replicated in real time to geographically separate disaster recovery environment
Outage reporting Publically available Trust Centre ( and customer notifications of any disruptions to service.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Questions & Answers, Knowledge Based Authentication, SMS code

There are 2 main user types that access the service:
SENDERS: Logon to the OneSpan Sign service to create, send and sign document packages.
SIGNERS: Notified by OneSpan Sign, use prescribed authentication step before viewing and eSigning documents.
Access restrictions in management interfaces and support channels No access to management interfaces outside of OneSpan Sign employees
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications SOC2

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards SOC2
Information security policies and processes Onespan Sign has a comprehensive set of security policies and standards that includes a Corporate Information Security Policy, approved by Senior Management.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Internally developed Change Management Standard and Change Management Process.
Requests For Changes (RFCs) require formal Change Advisory Board (CAB) approval. CAB analysis and decisions are documented.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The Information Security Director is responsible for ensuring that monitoring for vulnerabilities and threats
against the organization. Vulnerability assessments are to be performed on a weekly basis. Vulnerabilities are ranked (none to critical) and re-mediated accordingly.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Internally developed Monitoring and logging standard. Additional measures implemented to comply with the requirements of Health Insurance Portability and Accountability Act (HIPAA).
All administrative accesses to the system are logged, as well as all Database accesses. Host intrusion detection systems are also in place on all hosts. Events are correlated centrally using a Security Incident and Events Management (SIEM) system. Reports are reviewed daily, and thresholds are set for alarms to be sent to 24/7 support personnel.
Incident management type Supplier-defined controls
Incident management approach The Information Security Incident Response Team (ISIRT) is responsible for receiving and
responding to computer security incident reports and activity. Once an event has been classified as an incident, the ISIRT assesses, contains and eradicates the source of the incident.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £9 to £12 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial We have both a Free and Trial Version. Our Trial version is for free for 30 days.
Our Developer test version is free
Link to free trial

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑