Remote online notarization (RON) platforms employ a multi-layered security approach that often exceeds the security of traditional in-person notarizations. Here are the key security measures:
1. Robust Identity Verification
RON goes beyond simply looking at a physical ID. The process typically involves multiple steps to verify the signer's identity:
- Knowledge-Based Authentication (KBA): The signer is asked a series of "out-of-wallet" questions derived from public and private databases (e.g., credit history, property records). These questions are designed to be difficult for anyone but the signer to answer correctly.
- Credential Analysis: The signer uploads a photo of their government-issued ID (driver's license, passport, etc.). The RON platform uses sophisticated software to analyze the ID's security features, such as holograms, fonts, and watermarks, to ensure it's not a fraudulent document.
- Visual and Audio-Visual Confirmation: The notary performs a live visual comparison of the signer's face to their ID during the secure video conference. This allows the notary to confirm that the person on camera matches the verified identity.
2. Tamper-Evident Technology
A notarized document from a RON session is digitally sealed to prevent any unauthorized changes.
- Electronic Signature and Notary Seal: Both the signer's electronic signature and the notary's digital seal are applied to the document. This is not just a digital image, but a cryptographic certificate that is embedded in the document.
- Digital Audit Trail: The digital seal creates a "hash" or unique digital fingerprint of the document. If any part of the document is altered after the notarization is complete, the hash will change, and the tampering will be immediately evident to anyone who views the document's properties. This makes the document more secure than a paper one, which can be altered without a clear trace.
3. Secure Session and Record-Keeping
- Encrypted Communication: The entire RON session, including the audio-visual connection and the exchange of documents, is protected by strong encryption. This prevents unauthorized interception of sensitive information.
- Video Recording: The entire notarization session is recorded and securely stored. This recording serves as a reliable audit trail and a legal record of the transaction, providing evidence that the signer's identity was verified, they appeared to be acting voluntarily, and they understood the document they were signing.
- Secure Storage: The recorded session, the electronic journal entry, and the notarized document are stored on secure servers with strict access controls, often with additional security measures like multi-factor authentication for notaries.
4. Notary Vetting and Training
The security of RON is also dependent on the people involved. Reputable RON platforms conduct rigorous vetting of their notaries, which may include:
- Background Checks: Notaries are required to undergo a thorough background check before being allowed to perform online notarizations.
- Specialized Training: Notaries receive training on the RON platform's technology, security protocols, and state-specific laws and regulations for remote notarization. This ensures they are proficient in using the technology and following the correct procedures to ensure a secure and compliant transaction.