Document and process management

Use e-signing as a comparative advantage


E-signatures are a key component of digital operations – particularly for those companies that intend to use digitalization as a tool for growth and revenue increase – and an essential feature of comprehensive document life cycle management and inward digitalization efforts.

Using the InDoc EDGE information management platform for e-signing enables you to accelerate digitalization and ensure the compliance of your business. In cooperation with various trust service providers, we provide you with simple, advanced and qualified e-signing. Improve the customer experience and enable your business processes to run smoothly and efficiently.



or capture
a document


and revise
the content

  • Qualified electronic signature
  • Advanced electronic signature
  • Electronic signature




With InDoc EDGE, you can combine various types and modes of e-signatures and provide your customers, partners and co-workers with an optimal digital experience in the cloud or on your premises.

Qualified electronic signature

At Mikrocop, we enable qualified signing in cooperation with qualified trust service providers. Remote signing is a modern and most user-friendly mode of e-signing, as it does not require dedicated hardware or software. As a result, signatories can easily sign documents on any device and in any browser. The signatory’s e-identity is securely stored on a remote device for creating qualified electronic signatures and verified with strong multifactor authentication.

Advanced electronic signature

Your co-workers and the stakeholders with whom your employees share the documents that need to be signed can securely sign them using their digital certificates, which are on the EU trust list, or use a trust service from a certified trust service provider. InDoc EDGE users can easily sign a document in the document management system, or initiate signing as a process activity in your business processes. 

Electronic signature

In some cases, a simple electronic signature is quite sufficient. You can sign via InDoc EDGE with a click, mouse or your finger, a digital certificate that has been added to the InDoc EDGE repository, with a sign-pad or using a trust service from a certified trust service provider. Documents signed with an e-signature are additionally signed with a Mikrocop digital certificate or a digital certificate from a certified trust service provider after each signature.

E-signature type

E-signature provider

E-signature modes

  • Qualified
  • Sign using a trust service
  • Advanced
  • Sign with a digital certificate
    (trust list: EUTL)
  • Sign using a trust service
  • E-signature
  • Click to sign
  • Sign with your finger or mouse (HTML5)
  • Sign with a sign-pad
  • Sign with a digital certificate
    (trust list: InDoc EDGE)
  • Sign using a trust service

E-signing of documents
is powered by InDoc EDGE.
Want to know more?

Schedule a presentation

Cloud service

InDoc EDGE can be used
in Mikrocop's private cloud.


InDoc EDGE can be installed
in your data center.



We take a fully integrated approach to digitalization to deliver operational efficiency,
security and compliance to your business.


We ensure the validity
of your business documents
and facilitate corporate compliance.


We continually invest in
maintaining a high level of security and
in preventing confidential data leakage.


What is the level of assurance of electronic identification?

The level of assurance of an electronic identification (eID) determines the level of confidence that a person who shares a certain identity in a process is in fact the person to whom this identity is assigned. The means of electronic identification, e.g. a user profile on a social network or a digital certificate, have different authentication assurance levels.

The eID means differ in the methods used for identity proofing and verification upon the issuance of eID means, the procedure of issuing, delivery and activation of eID means, the methods of management of the means, resilience to security threats, and the number of authentication factors needed to complete the authentication process.

How to assess the risk of identity fraud or user identification irregularities?

Risk is assessed based on a set of criteria that refer to the consequences of incorrect user authentication, identity fraud or misuse, i.e. the legal consequences, reduction or loss of reputation, economic loss and accountability, impact on our activities and unauthorized disclosure of personal data.

The level of risk depends on the level of loss that might incur in the event of authentication failure or identity fraud and the likelihood of such an event. A higher risk level requires a higher level of assurance for the used electronic identification means.

What are the key risk assessment criteria?

When assessing the risk, the following criteria should be taken into account as a minimum:

  • What are the legal implications of identify fraud or authentication failure?
  • Are there any specific statutory requirements in relation to assurance levels?
  • Can unauthorized persons access personal data?
  • Can identity fraud cause a change in the identification data in data registers?
  • What economic loss may result from identity fraud or inaccurate identification?
  • Can fraud or irregularities affect the personal and legal safety and health of the user?

The selection of criteria can be modified as desirable on the condition that all key factors have been taken into account and that the same criteria are used to assess the risk of all the processes where identification is required.

Are e-signatures suitable for all types of documents?

Normally yes, with the exception of certain documents for which an e-signature is not permitted by way of sectoral legislation. Examples of such documents include bonds, cheques, and bills of exchange...

Can a signature pad capture biometrical parameters?

Biometric measures may only be implemented in the private sector if this is urgently required for the purpose of providing an activity, ensuring the safety of persons or property, or protecting classified information or trade secrets. Prior to the implementation of any biometrics, we need to submit a description of projected biometric measures to the Information Commissioner, along with the grounds for their implementation. Such measures can only be introduced once permission has been received from the Information Commissioner.


Do you want to use e-signing as a comparative advantage?

Contact us