How does ZealiD protect my data?
ZealiD only stores data that we need to provide the service.Your signature is protected by multiple encryptions, located in the secure storage of your phone and certified signature devices in our servers. Access to data is based on the principle of leas...Read more
Is this process secure?
Yes. ZealiD has the status of Qualified Trusted Service provider and is subject to recurring audits and regulatory supervision. We use the best available technology to protect the integrity of your data. ZealiD uses widely accepted standards such as Oau...Read more
Is your identity verification method secure?
Yes, our identification method is designed to meet the eIDAS level. It is safer than a video conference because it uses dual identification sources (bank authentication and verification of identity documents).Read more
How do you ensure that my data is available only to me?
We use a multi-layered approach to validate your identity. The password validation sent to you when you register with the ZealiD app is the first step in this process. Additionally, depending on the sensitivity of the information we share back with you,...Read more
How can I be sure that my signature will not be used without my consent?
Your signature is encrypted with a secret that is on your mobile phone. Only you can unlock it for signing.Read more
What should I do if I lost my phone?
Contact us and request to revoke your certificate for security reasons.Note: If someone found your phone, they would still need to unlock it and provide your biometric authentication in order to use the app.Read more
How do I use the ZealiD app in a secure way?
Make sure that only you have access to your phone, do not share it with other people.Note: Signing with your digital identity will require another biometric authentication by you; therefore, it is not immediately possible for anyone else who has access ...Read more
How can I avoid scams?
Always look at the content of the document that you are being asked to sign. Do not rely just on the document or sender name. Be aware that an attacker might have control of the mail account of a person that you know, and may send fraudulent documents i...Read more
How do we integrate with ZealiD's services in a secure way?
Our partner APIs are provided on static IPs using TLS. Limit source and destination IPs on your side to those endpoints, and verify that TLS connections are based on our CA.Read more
How can I contact you about security issues?
You can reach us by mail at firstname.lastname@example.org.We request that you do not use this contact for commercial offers.Read more