Alerts and updates

Subscribe using the DocuSign Trust Center Alerts RSS feed URL: https://www.docusign.com/trust/alerts/feed.
Add an RSS reader extension to your browser (Chrome, Firefox), or enable via Outlook on a PC.

  • The DocuSign CLM and CLM.CM January 20.1 UAT Product Release will be deployed to the UAT environment on Thursday, January 09, 2020 between 8:00 PM and 11:00 PM, US Central Time.

    We do not anticipate any impact to availability or access during this Product Release.

    Release Notes for this upcoming release can be found on the DocuSign Support Center.

    Please contact Technical Support if you have any questions.

  • Please see the DocuSign public trust page at https://www.docusign.com/trust/compliance/public-certificates for the CA Site Certificate availability and enforcement schedule in February 2020.

  • DocuSign has observed a new phishing campaign that began around 8:20AM on the morning of December 4 (Pacific Time). The email purports to come from " DocuSign Electronic Signature Service” or similar using the email address "docusign@livefantastic.net” The emails have the subject line similar to:

    "You received notification from DocuSign Service " 

    These emails contain a link to a malicious script. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

  • As part of the validation of our business continuity plan, we plan to perform a switch test between PA2 (main site) and PA3 (backup site) in production. This test will be done in two steps:

    • On Tuesday, December 10, 2019, at 10pm (CET), the flow in production will be redirected to the PA3 backup site. An interruption of service of less than 15 minutes is expected during this operation.
    • On Thursday, December 12, 2019, at 10pm (CET), the flow in production will be redirected to the PA2 main site. An interruption of service of less than 15 minutes is expected during this operation.

    This will impact the following features in your DocuSign account:  

    • IDnow EU Qualified Signature
    • DocuSign EU Advanced Signature
    • DocuSign EU Advanced with DocuSign ID check
    • DocuSign EU Qualified with in-person ID check
    • DocuSign EU Advanced Electronic Seal
    • DocuSign Protect and Sign

    No action is expected from you before or during these operations. Please contact DocuSign Support at https://support.docusign.com/ if you have any questions.

  • The new DocuSign Connect X.509 certificate for NA1, NA2, and NA3 offered on October 16, 2019, will be enforced as the sole Connect certificate on January, 22, 2020.

    Please see the DocuSign public trust page at https://www.docusign.com/trust/compliance/public-certificates for a full schedule for new and current Connect certificates offer and enforce dates.

  • DocuSign CLM's (FKA SpringCM) December 2019 Product Release will be deployed to the Production (NA11 | NA21 | EU11 | EU21) environment on Friday, Dec 6th 2019 between 9PM and Midnight, US Central Time.

    We do not anticipate any impact to availability or access during this Product Release.

    If you have any questions, please contact your customer success manager or reach out to DocuSign CLM Support.

  • The Docusign NA1, NA2, and NA3 environments' new Connect x.509 certificates' planned enforcement date of November 13th 2019 is postponed until further notice. Customers will be notified in advance once a new date has been determined.

    Please see the Docusign public trust page at https://www.docusign.com/trust/compliance/public-certificates for a full schedule for new and current Connect certificates offer and enforce dates.

  • DocuSign has observed a new phishing campaign that began around 9:00AM on the morning of October 31(Pacific Time). The email purports to come from " You got notification from DocuSign Electronic Signature Service ” or similar using the email address "docusign@damcogroup.us” The emails have the subject line similar to:

    "You got notification from DocuSign Electronic Signature Service"

    These emails contain a link to a malicious script. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

  • DocuSign has observed a new phishing campaign that began around 8:00AM on the morning of October 29(Pacific Time). The email purports to come from " DocuSign Signature and Invoice Service ” or similar using the email address "docusign@acceleratedtechinc.com” The emails have the subject line similar to:

    "DocuSign Signature and Invoice Service "

    These emails contain a link to a malicious script. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

  • DocuSign has observed a new phishing campaign that began around 7:30 AM on the morning of October 28(Pacific Time). The email purports to come from " DocuSign Signature and Invoice Service” or similar using the email address " docusign@dealegraphics.com” The emails have the subject line similar to:

    "You got notification from DocuSign Signature Service “

    These emails contain a link to a malicious script. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

  • DocuSign has observed a new phishing campaign that began around 7:30:00 AM on the morning of October 24(Pacific Time). The email purports to come from "DocuSign Electronic Signature and Invoice Service” or similar using the email address "docusign@nicolettetorres.com” The emails have the subject line similar to:

    "You got notification from DocuSign Signature Service “

    These emails contain a  malicious macro enabled word document. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

  • DocuSign has observed a new phishing campaign that began around 8:30 AM on the morning of October 23(Pacific Time). The email purports to come from "DocuSign Electronic Signature” or similar using the email address "docusign@2onthetown.com” The emails have the subject line similar to:

    "You got notification from DocuSign Signature Service “

    These emails contain and it contains a .zip attachment with a malicious .vbs file. These emails are not sent from DocuSign. Do not click on the link in these emails, instead please forward them to spam@docusign.com and then delete the email immediately.

    For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB)

Pages