DocuSign: Security Recommendations

A knowledge base article about DocuSign: Security Recommendations provided by the UC Berkeley IT Service Hub - Knowledge Portal

The Opportunity

DocuSign’s business relies on stringent security controls. ISO has reviewed DocuSign’s controls and is comfortable with its security including for P4 data when required for your business process.  

Nevertheless, every DocuSign user must be vigilant about security; we are mutually responsible.

This article provides recommendations and information about several security features.

Table of Contents


Default Envelope Email Message

Set by UC DocuSign Team; Department Account Administrators can change



Note: Screengrabs are taken when the browser window is full-size. 

Narrowing the browser window might change what you see.

Log-in Required If User Has an Account

Set by UC DocuSign Team

Completed Envelope Delivery

Set by Department Account Administrators

Note: Screengrabs are taken when the browser window is full-size. 

Narrowing the browser window might change what you see.

Envelope Recipient Access Expiration and Recipient Authentication via Access Code

Set by Department Account Administrators and Senders


Envelope Access Code

Set by Senders




Note: Screengrabs are taken when the browser window is full-size. 

Narrowing the browser window might change what you see.

Session Timeout

Set by Department Account Administrators

Require New Signature

Set by Senders



Note: Screengrabs are taken when the browser window is full-size. 

Narrowing the browser window might change what you see.

Restrict Field Content Visibility

Set by Template Preparer




Note: Screengrabs are taken when the browser window is full-size. 

Narrowing the browser window might change what you see.

Integrations, Downloading Completed Envelopes and Retention Management

Set by Department Account Administrators