• Audit risk compliance
  • Facilities
  • Human resource management

Going digital has a huge upside, and electronic signatures are no exception. The paper-process burden of printing, posting, signing, returning, copying, filing and physically storing signed documents is obsolete with new digital options to fill, sign and submit, cutting days to weeks out of administration. The digital way with eSign and eForms through Signmee makes it quicker and simpler for businesses, governments, organisations such as schools and medical practices, and those they interact with to validate authorisation.

In the case of e-signatures, there’s a danger of a digital imposter fraudulently authorising financial transactions, medical approvals and general consent forms. To solve digital risk and protect sensitive data, Signmee has incorporated state-of-the-art cyber security and authorisation software Cipherise. Cipherise validates all parties signing and distributing a document to put an end to fraudulent activity and stop identity theft


  • No installation required
  • Accessible from any device
  • Self service form creation
  • Individual and bulk distribution to contact list
  • Template library for rapid form creation
  • Audit trail with open rates
  • eFill, ePay and legally binding eSign all from a single form
  • Personal Inbox for each recipient to store signed forms
  • Auto data collection, collation and reporting
  • State-of-the-art authentication with Cipherise


  • Save time and money on processes by removing the need to fax, scan, print and file
  • Save costs by reducing paper, travel needs, postage
  • Close deals faster by signing online in minutes
  • Control security and authenticity by authenticating all users
  • Track progress of documents
  • Reduce legal risks and ensure compliance with full audit and tracking
  • Increase customer, supplier and staff satisfaction by simplifying sign-off
  • Reduce duplication and document loss
  • Rapidly collate response data via reports
  • Eco-friendly
Free trial available
Minimum price
$16.00 AUD Per distributions per month
Maximum price
$157.00 AUD Per distributions per month
Variables affecting pricing

Number of accounts, support, training

Education pricing


Pricing differences

Lower than enterprise pricing

Not-for-profit pricing

All not-for-profit

Pricing differences

School pricing

Become a registered buyer to purchase this product.

Onboarding and offboarding

Onboarding assistance

Any buyer can set up a personal Signmee account and then create a business or school account. Buyers can switch between a personal Signmee account (where forms are received/signed) and a business account (where forms are created and sent for signing). A buyer can add other members of the organisation to the account for free. These members can then build and send forms on behalf of the business. Permissions can be set to control access and restrictions for each member. Once the free month trial expires, the account can be upgraded to a paid account.

Schools and business may opt for individual assistance with setting up and implementing Signmee. Individual assistance starts at $500 depending on the level of support required. This fee covers training, importing contacts, building templates, change management and best practice support.

Offboarding assistance

Once a subscription expires, there is no need to renew unless the buyer wants to continue to use the product. The account will remain accessible.

Signed forms can be downloaded individually and stored out of Signmee. However, bulk download of forms must be carried out by the Signmee technicians.

A facility to download all forms in bulk is being developed and will be available in 2019.

There is no cost associated with retrieval of data.

Availability and support

Guaranteed availability (excluding scheduled outages)

Clause 7 of Signmee Terms and Conditions outline:


7.1. The Company will use its best endeavours (at all reasonable times) to:

7.1.1. provide the Account Holder with access to the Website and the Application via a Supported Web Browser, but does not guarantee that such access will be constant, uninterrupted, that the Application will be bug or error free or that the Application will offer full Functionality at all times;

7.1.2. fix (or, at its discretion, provide a workaround solution to) any bug or errors of which it becomes aware within a reasonable period of time;

7.1.3. give reasonable notice (by way of posting a notice on the Website and to alert the Account Holder of any planned downtime or known period of non-accessibility to the Website in advance;

7.1.1. provide the Account Holder with access to the Website and the Application via a Supported Web Browser, but does not guarantee that such access will be constant, uninterrupted, that the Application will be bug or error free or that the Application will offer full Functionality at all times;

Support options available
  • Phone
  • Email
  • Online
  • Onsite
Which options come at additional cost

Onsite support is available for buyers who pay the additional support/training fee.

Support levels, availability hours (AEST) and whether additional costs are involved

The Company will use its best endeavours to promptly respond to requests for Support, and will usually respond within one (1) Business Day of receipt of the request email. If such a request is received by the Company after 1 pm on any Business Day, the Company may not respond to the request until the following Business Day. Similarly, if requests for Support are received by the Company on a day that is not a Business Day, the Company will respond to the request on the next Business Day.

Reporting and analytics

Metrics reported

Plan details, number of contacts, number of student contacts, number of members (active and inactive), available credits remaining, distribution and usage totals, open rates, signed rates, SMS balance, number of distributions by month/year/tag, response rates by month/year/tag, member activity

Reporting types
  • Real time
  • On request
Outage reporting
  • Dashboard
  • Other
Other outage reporting

Published on the Signmee knowledge base:

Usage reporting
  • Email

Identity and authentication

User authentication needed
User authentication
  • Username password
  • 2fa
  • Federation
  • Other
Other user authentication

Cipherise by Forticode


Cloud deployment model
  • Public cloud
Software add-on or extension




What users can and can't do using the API

Sync response data from forms with other business systems.

Compatible API automation tools

Currently we integrate with ERPs and payment gateways to automate payments, and update data within business systems.

Web interface
What users can and can't do using the web interface

All functionality

Supported browsers
  • Ie9
  • Ie10
  • Ie11
  • Ms edge
  • Firefox
  • Chrome
  • Safari9
Application for users to install
Designed to work on mobile devices
Differences in the mobile and desktop functionality

Virtually all functionality is available on a mobile device, however the responsive design means that the layout changes to suit the device. Some columns are hidden and can be expanded by clicking a plus symbol.

Accessible to WCAG 2.0 AA or above


Areas which are accessible (and exclusions)

Signmee has a large number of plugins, which may cause keyboard trapping, including a WYSIWYG, Payment gateways...

How the product or service scales



Whether users can control where their data is stored, processed and managed in Australia
Locations where user data is stored, processed and managed

Australia default

Whether the seller operates their own data centres
Whether third parties are involved in storing, processing or managing buyer data
The third parties involved

Microsoft Azure - all data storage (Platform as a Services)
Sendgrid - name/email address (Sending email alerts from Signmee)
Twilio - name/phone (Sending Text Messages using Signmee)
PayPal (if selected by user as payment method)
Braintree (if selected by user as payment method)
POLi (if selected by user as payment method)

User data

Data import formats
  • Csv
Data export formats
  • Csv
  • Json
Whether there are restrictions on users accessing or extracting data
Whether users can access audit information about activities and transactions
The maximum time audit information data is stored

1 month

The maximum time system logs are stored


Approach to secure data disposal

All data is stored and backed up on Microsoft infrastructure, and stored in line with Microsoft Data retention policies. Data is deleted and removed as required by users. When drives are changed, data is completely overwritten to ensure that data cannot be recovered by any means.

When disk drives are decommissioned, they are purged or destroyed according to NIST 800-88 Guidelines for Media Sanitation.

Backup and recovery

What is backed up


How often backups are performed

Supplier controlled

How users recover backups

Contact support

Data protection

Data protection between buyer and supplier networks
  • Tls
Data protection within the supplier's network
  • Tls
Data protection at rest
  • Physical csa ccm v3
  • Obfuscating
Who controls encryption keys


Security standards

Data centre security standards

Recognised standard

ISO/IEC 27001:2013 certification
ISO/IEC 27017:2015 certification
ISO/IEC 27018:2014 certification
CSA STAR certification
PCI DSS certification
SOC II certification
IRAP assessed

Not assessed

Certified by the Australian Signals Directorate (ASD)
Further information about security assessments

Security practices

Approach to secure software development best practice

Self assessed

How often the supplier conducts penetration testing

Less than once year

The supplier's approach to penetration testing
  • In house

Separation between users

Virtualisation used to keep users sharing the same infrastructure apart

Operational security

Configuration and change management processes

Supplier defined

Configuration and change management approach

Agile methodology:
Ticketed issues
Create new release
Tested in UAT environment
User acceptance sign off
Pushed to staging for Verification with live data
Schedule deployment (notifications posted when system will be offline)
IP switching in Azure to deploy unless migrations are necessary, in which case the system is temporarily taken offline to carry out the migrations.

Vulnerability management processes

Supplier defined

Vulnerability management approach

We use Azure and follow the vulnerability and security recommendations

Protective monitoring processes

Supplier defined

Protective monitoring approach

We use Azure and follow the vulnerability and security recommendations

Crisis and incident management processes

Supplier defined

Crisis and incident management plan

Azure platform incident management with disaster recovery

How often access controls are tested