This guide provides technical instructions for recipients who are executing a document initiated via a Public Signing Link.
Prerequisites
- Access to a valid IUSign Public Signing Link (URL or QR Code).
- Internet connectivity with support for TLS 1.2+ encryption.
Strategic Overview
Public Signing Links allow organizations to distribute documents to undefined recipients for autonomous execution. Unlike a standard invitation, where the sender pre-defines the recipient, a Public Link allows you to initiate the transaction yourself. This model is commonly used for waivers, registration forms, and public petitions. To ensure legal defensibility, IUSign mandates a "Self-Identification" phase followed by the standard cryptographic signing process.
Implementation Sequence
1. Ingress and Identity Capture
Upon selecting the Public Link, you will be prompted to provide your primary identity parameters:
- Legal Name: Required for forensic identification.
- Email Address: Used for identity verification and the delivery of the finalized document.
2. Identity Verification (OTP Handshake)
To prevent unauthorized or fraudulent signing, IUSign dispatches a unique One-Time Password (OTP) to the email address you provided.
- Verification: Enter the OTP code into the portal to authenticate your identity.
- Access: Once verified, the document assets are decrypted and the signing portal is initialized.
3. Document Execution
Proceed through the document using the Guided Execution flow:
- Consent: Agree to the Electronic Record and Signature Disclosure.
- Field Interaction: Execute all mandatory signature, initial, and data fields assigned to your role.
- Finalization: Select Finish to submit your execution.
Post-Execution Handshake
| Event | Outcome |
|---|---|
| Notification | The organization that generated the link is notified of your completion. |
| Asset Delivery | You will receive an automated email containing a link to download your signed copy. |
| Audit Trail | Your identity parameters (Email/IP) and the OTP verification event are recorded in the permanent forensic log. |
Strategic Considerations for Recipients
- Email Access: Ensure you have immediate access to the email address you provide, as the identity verification step is mandatory and time-sensitive.
- Legal Validity: Documents signed via Public Links are just as legally binding as those initiated via direct invitation, provided all verification steps are completed.
- Session Persistence: If you close the browser before finishing, you can re-initiate the session via the same Public Link using the same email address to Resume Progress.
Diagnostic and Resolution Protocols
| System Exception | Probable Cause | Resolution Protocol |
|---|---|---|
| OTP not arriving | SMTP block or Syntax | Check your spam folder and verify that you entered your email address correctly. |
| Link shows 404 | Link deactivated | The organization may have deactivated the link or reached its interaction limit. Contact the organization for a new link. |
| Invalid verification code | Code expired | Codes are typically valid for 10-15 minutes. Request a new code via the portal if necessary. |