Secure by Design


Authentication Security: Our service uses Office 365 OAuth to authenticate users. No password is ever collected, transmitted, or stored by us.

No Accessible Online Signature Views: Online signature views, when needed, are via encrypted URL’s, rather than via public endpoints.

No Access to Your Email: Our process does not require that your email messages be routed through our servers for the signatures to be applied or “stamped”, and therefore we have no access to your email.

Add-in Security: Outlook add-ins are different from COM or VSTO add-ins, which are older integrations specific to Outlook running on Windows. Unlike COM add-ins, Outlook add-ins don’t have any code physically installed on the user’s device or Outlook client. For an Outlook add-in, Outlook reads the manifest and hooks up the specified controls in the UI, and then loads the JavaScript and HTML. The web components all run in the context of a browser in a sandbox.

Outlook on Windows uses a JavaScript file, while Outlook on the web uses an HTML file that can reference the same JavaScript file. References to both these files are supplied in the Resources node of the manifest (XML) and the Outlook platform ultimately determines whether to use HTML or JavaScript based on the Outlook client.

Per Microsoft’s guidance, our event-based add-in is short-running, lightweight, and as non-invasive as possible. We use the “event.completed method” to signal that our add-in has completed processing the launch event. If, for any reason the add-in has remained open, Outlook automatically ends it when the user closes the compose window.

email signature add-in scan results

For additional technical information, read Microsoft’s Privacy and security for Office Add-ins article.

Server Security: Our servers are secured using industry best practices. Access is limited to only Digitech Branding employees who need access for business purposes. Our services are hosted on AWS and are protected with Cloudflare. All HTTPS traffic is served over TLS 1.2. Our primary data locations are AWS US East (Ohio) and AWS EU West (Ireland).

Performance Note: To maximize performance, we keep a multi-region table to locate signatures across regions and serve them to Outlook from any region, with the actual signature content being cached globally and securely. The result is that user’s Outlook experience (using the add-in) will have the exact same latency from anywhere in the world independent of their tenant’s region of choice.

Level 1 Data: Due to the nature of email signature data, we work exclusively with level 1 data.

Penetration Testing: We contract for annual penetration testing and promptly rectify any issues or vulnerabilities that are uncovered.

Application Vulnerability Scanning: We employ SonarCloud to scan our code (back-end and O365 add-in) for vulnerabilities.

Independently Tested & Verified:

TAC Security


Our Security Policy - Executive Summary

Digitech Branding is committed to protecting the confidentiality, integrity, and availability of customer data processed through the Dynasend email signature platform as follows:

  • Cloud Security: Dynasend is hosted in Amazon Web Services (AWS) in the United States and the European Union, benefiting from AWS’s certified infrastructure security, redundancy, and compliance programs.
  • Data Protection: All customer data (“business card” information such as name, title, business email, and phone) is encrypted in transit (TLS 1.2/1.3) and at rest (AES-256). Data can be restricted to US-based storage and access upon request.
  • Access Control: All system access is unique, role-based, and secured with multi-factor authentication. Privileged access is strictly limited.
  • Testing & Assurance: Regular vulnerability scans, annual third-party penetration tests, and patch management processes ensure our systems remain secure.
  • Incident Response: In the unlikely event of a security incident, customers will be notified within 48 hours, and appropriate remediation and forensic measures will be taken.
  • Continuity & Recovery: Daily encrypted backups are maintained in separate AWS regions. Business continuity and disaster recovery plans allow restoration within 24 hours of a disruption.
  • Governance: Security responsibilities are led by the CEO/CSO. Policies are reviewed annually, and all staff complete annual security awareness training. Commitment to Customers

Although we are a small business, we follow industry-recognized practices proportionate to our operations and customer requirements. Our security controls are practical, tested, and aligned with customer contractual obligations.

In conclusion, Digitech Branding has the people, processes, and technology in place to safeguard customer data and maintain service availability, ensuring Dynasend remains a trusted and secure platform.

IT Security Policy
Business Continuity Plan
Disaster Recovery Plan
System Security Plan