Compliance, in full, on every plan
Every signature on vouch.ink — the free ones too — ships with the same ESIGN- and UETA-compliant evidence package. No "premium" audit tier. No "enterprise" hash chain. No paywall on the legal record.
A product of Novan LLC. Used by The Mindful Landlord.
What every signature ships with
Intent
Each signer affirmatively clicks "I agree to sign electronically" before they ever touch a field. The consent event is timestamped, IP-stamped, and bound into the audit chain — separate from the signature itself.
ESIGN § 7001(c) · UETA § 5(b)
Attribution
View, consent, field-completion, and final signing each capture the requester IP, browser user-agent, and the unique signed-link token that proves the action came from the invited mailbox.
UETA § 9 · ESIGN § 7006(5)
Tamper-evidence
Every audit row stores the SHA-256 of the previous row plus its own payload. Modifying any historical event invalidates every hash that follows. PostgreSQL triggers reject UPDATE and DELETE on the audit log table.
FRE 901(b)(9) · 902(13)
Document integrity
When a document is finalized, the SHA-256 of the resulting PDF is written to the database, embedded in the audit chain, and printed on the Certificate of Completion. All three must match for the document to verify.
FRE 901(b)(4) · 1001(d)
Server-side time
Every audit event is timestamped on the server in UTC. We never accept a timestamp the client claims. The Certificate of Completion shows times in both UTC and the server-resolved local zone of each signer.
Standard authenticity practice for e-records
Per-page identity
Each page of the signed PDF carries the document ID, a short hash, and the page number in the bottom-right footer — so a printed page in a binder still ties back to the digital record.
Best practice for binder evidence
Certificate of Completion
Every finalized document has a multi-page Certificate of Completion appended: parties, timestamps, hash, IP per signer, and the full event history with chain integrity check.
Standard cover-letter practice for e-records
Retention & access
Both the original uploaded PDF and the signed PDF are retained in tamper-evident storage. Either party can request a copy. The Certificate of Completion is regenerable from the audit log if lost.
ESIGN § 7001(d) · UETA § 12
Withdrawal of consent
A signer can decline at any point before all signatures are gathered. The decline is captured as its own audit event — the document moves to "declined" status and cannot be re-sent without sender action.
ESIGN § 7001(c)(1)(B)(iii)
Hardware & software
Per ESIGN § 7001(c), the signer must be able to access the document with reasonable hardware and software. We render in any modern browser — no app install, no plugin, no PDF reader required.
ESIGN § 7001(c)(1)(C)
Public chain verification
The audit-trail PDF lists every event hash in plain text. Anyone with the document and a SHA-256 utility can recompute the chain end-to-end. We have nothing proprietary in the verification path.
Independent verifiability — best practice
What others charge for
Every competitor in the e-sign market puts the legal record itself behind a higher plan. Here's what that looks like — and what we do instead.
| Capability | Industry norm | vouch.ink |
|---|---|---|
| Audit trail PDF | Mid-tier or higher (typically $25+/mo) | ✓Free plan, full detail |
| Tamper-evident hash chain | Enterprise-only on most platforms | ✓Every plan, verifiable by you |
| IP and user-agent capture | Often labelled "advanced authentication" — paid | ✓Default on every signature |
| Certificate of Completion | Available — but PDFs of audit data start at higher tiers | ✓Auto-appended to every finalized PDF |
| Document expiration | Sometimes paywalled; often only "Business+" | ✓Configurable on every plan |
| Reusable templates | Limited templates on lower tiers (3–5) | ✓Every plan has templates; tiers gate count |
| Per-page document-ID stamping | Rare; usually a setting buried in admin | ✓On by default, every plan |
| API access | Always paid, usually a separate add-on | ✓Team plan ($24/user/mo) — same trail format |
| Number of recipients per envelope | Often capped on lower tiers | ✓Uncapped on every plan |
Industry-norm column reflects publicly-listed plan structures of major e-sign vendors as of April 2026. Names omitted intentionally; the pattern is the point.
What we ship, plainly
We're not lawyers and this isn't legal advice. We list what we capture; how a specific signature holds up depends on the document, the parties, and the jurisdiction.
How tamper-evidence works
Chain 1
Each row stores the SHA-256 of the previous row + its own canonicalized JSON payload. The very first event chains off a known genesis string per document.
this_hash = SHA-256( prev_hash + canonical_json(payload) )
Chain 2
When the final PDF is sealed, its SHA-256 is computed and stored in the document row, written into the audit chain as a "sealed" event, and printed on the Certificate of Completion.
signed_pdf_hash = SHA-256(final_pdf_bytes) stored in: 1. documents.signed_hash 2. audit_log "sealed" event 3. Certificate of Completion
Chain 3
Supabase Storage independently records the object's ETag and content-hash. We compare against our stored value on every download — divergence triggers a chain-broken warning.
etag = storage.head(path) assert etag.sha256 == documents.signed_hash
Any modification to a single audit row, the PDF, or the storage object recomputes its own hash — and breaks every chain that follows. You can verify the entire chain from your dashboard with one click.
What we do gate
Volume
Free and Pay-as-you-go cap at five documents per calendar month. Operator and Team are unlimited. Same audit trail on all four.
Branding
Operator and Team get your logo, your colors, your sender name on the signing page and the email. Free and PAYG sign on the vouch.ink page. The signature is the same; the wallpaper is different.
API & roles
The Team plan unlocks REST API access, multi-user organizations with role-based permissions, and webhook delivery for integration into your own systems. The audit trail those APIs return is identical to the one a free user gets in the dashboard.
Always free, every plan
ESIGN/UETA-compliant signing flow · hash-chained audit log · server-side timestamps · IP and user-agent capture · ESIGN § 7001(c) consumer consent · per-page document ID stamping · Certificate of Completion · SHA-256 PDF integrity hash · append-only database triggers · downloadable audit-trail PDF · public chain verification.
Five free documents a month. Full evidence package included. No credit card. Cancel by closing the tab.