Hip, hip, hooray 🎉 It's National Notary Public Day! This one's for you, notaries.

We just launched Defend, Proof's AI-powered identity fraud detection. Read on here.

With IAL2 certification, we’re bringing proof to every signature

With IAL2 certification, Proof delivers the first eSignature platform that meets this high remote identity verification standards.
Hilary Walker
December 19, 2023

We're thrilled to announce that our signature NIST IAL2 compliant Proof transactions are now backed by the Kantara Trust Mark. This certification empowers our customers with the assurance that our solution has undergone rigorous evaluation and gained approval from the world's leading consortium dedicated to enhancing the trustworthy use of identity and personal data.

Lock in Trust on Every Transaction 

NIST IAL2 raises the standard of remote identity verification. With increased security, there is always the tradeoff of introducing added friction. However, at Proof we’ve spent countless hours developing a comprehensive yet flexible workflow that effortlessly achieves IAL2 compliance while providing a seamless experience for your customers. 

Does your business need IAL2 verification for specific documents or workflows? Or do you simply want a very high level of security for all your most critical transactions? 

This certification allows legacy industries to be digitized, including:

Even if you don’t work in a highly regulated industry, IAL2 is quickly becoming the standard for securing someone’s identity at any point during your process. Especially when it comes to document signing, a basic eSign just isn’t enough. Fraud has remained a front-page issue since the beginning of the pandemic.  You can regularly read stories about identity fraud in the Real Estate industry where someone’s property has been sold out from under them by a bad actor who wasn’t properly vetted. 

The good news is, you don’t need to come up with your own security requirements. Just look to Proof and the rigorously defined standards of NIST. With the Proof platform, you can expect:

  • Access to the only signature product with IAL2 identity verification seamlessly built into a single platform. Other signature platforms claim they have “Liveness detection with AI” but what good is that if it’s never been audited, doesn’t meet federal security standards, or if the technology fails due to the fast pace of fraud?
  • An intuitive user experience, with passive database checks, designed to do the heavy lifting for your customer. 
  • A platform that steps up to connect your customer to the largest on-demand network of trusted agents that will help verify their identity in minutes. There will always be cases where a customer needs to be escalated to another human in order to finish the verification process. 
  • A more secure automated identity verification process that doesn’t sacrifice on success rates due to our ability to connect your customer to our network of trusted referees within seconds. 

Your customer’s Proof experience

Your customer will receive an email or SMS to initiate the Proof verification process. They will be able to use either mobile web or their desktop to complete their verification - whatever is most convenient for them. 

Once they’ve initiated the process, they will be directed to fill in their personal information, and capture an image of two forms of credentials (e.g. drivers license, passport, utility bill) and a selfie. 

If at any point during the verification process, the Proof platform uncovers any inconsistencies, or your signer does not have adequate identification, we will step up the verification process to a trained trusted referee. 

If the trusted referee verifies your signer’s identity they’ll be able to move forward and immediately sign their document. 

How our trusted referees support the verification process

Proof trusted referees have access to the signer’s identity information, credential and selfie images, and verification analysis. But unlike a meeting with a notary, they do not have access to the document that is being signed. 

Trusted referees go through rigorous fraud prevention training that enables them to make an informed decision about the individual in front of them. They also have a wealth of tools at their fingertips to help validate the signer’s identity, that includes detailed information about any issues that arose during the credential analysis and selfie verification process. 

Once the trusted referee verifies your signer’s identity, they will complete the meeting. The signer is then directed to sign their document, where they can take their time without the trusted referee present. 

At any point during the lifecycle of the transaction, you can review the identity verification process on the new Identity tab. You have all the critical information needed to make your own determination if you feel at any point that there is an issue with the signer’s identity and you wish to cancel the transaction. 

We don’t expect that many of your signers will require a meeting with a trusted referee. But in the event that they do, Proof is the only platform that can ensure your identity verified transactions are completed on time, all while providing your signers with a convenient and efficient user experience.  

Don’t wait for a fraudulent signer to take advantage of your current eSign practices, use Proof to protect yourselves and your customers. 


National Institute for Standards and Technology (NIST) is part of the Department of Commerce. Most notably known in technology for its extensive standards around cybersecurity. They published a digital identity guideline 800-63 that many state departments follow, now also regulatory bodies

Kantara Initiative operates conformity assessment, assurance and grant of Trust Marks against de-jure standards under its Trust Framework program whilst in parallel nurturing ‘beyond-the-state-of-the-art’ ideas and developing specifications to transform the state of digital identity and personal data agency domains.

graphic of envelop on a square

Subscribe to our newsletter

Related Articles