Proof of signature log: what is it for?
The audit trail is the legal backbone of the electronic signature. How to read and use it.
Certyneo
Rédacteur — Certyneo · À propos de Certyneo

What is a proof log
What is a proof logTheproof log(oraudit trail ⬥⬥⬥) is the time-stamped log of all actions carried out on an electronic signature document: sending, opening, OTP entry, signature, refusal, expiration.
It is the equivalent of a digital “logbook”, which constitutes the main opposable proof in the event of a dispute.
Typical content
Each recorded event includes:
- precise date and time(usually qualified timestamp)
- action(sending, opening, OTP sent, OTP entered, signature, refusal)
- actor(signer, system)
- IP addressof the signatory
- user-agent(browser and OS used)
- metadata(document size, fingerprint, etc.)
The log of proof in front of the judge
The French courts recognize the proof log as a determining element in the event of litigation, as long as it is:
- produced by an eIDAS compliant platform
- complete and coherent
- timestamped by a trusted third party
- kept for the legal periods
The log combination proof + signed PDF with cryptographic fingerprint makes good faith challenge extremely difficult.
Where to find the journal
Two typical locations:
- Two typical locations:Integrated into the PDF ⬥⬥⬥: often on last page, summary visible
- Accessible via the platform ⬥⬥⬥: detailed exportable audit trailSome platforms provide a
public verification linkallowing anyone to view the newspaper without an account.Concrete use
In internal audit
check the conformity of signatures
- check the consistency of dates
- identify anomalies (unusual IP, suspicious times)
- In litigation
produce the log as proof in court
- refute a signature challenge
- establish a precise chronology
- Under regulatory control
URSSAF, labor inspection, CNIL
- export of the log for the contracts concerned
- Good practices
Keep the log
- for the entire legal duration of the documentExport periodically
- to avoid platform dependencyNever edit
- the log manually (invalidates the proof)Train your legal teams
- in using the logCommon errors
Only keep the PDF, not the log
- Only keep the PDF, not the log
- Store the log in a proprietary, non-exportable format
- Forget to include the qualified timestamp
- Do not anonymize the logs when transmitting them to third parties
Concrete case: signature dispute
A dismissed employee disputes having signed its non-competition amendment. The employer produces the proof log:
- precise date: March 15, 2024, 2:32 p.m.
- IP: consistent with domicile
- OTP SMS entered on the employee's phone (number in his file)
- imprint of the PDF unchanged since
The industrial tribunal rejects the challenge — decisive evidence log.
How Certyneo helps you
Certyneo automatically generates a complete proof log for each signed envelope. Exportable in PDF or JSON, integrated into the final PDF, kept for 10 years, and available via public verification link for third parties.
Discover the Certyneo electronic signature solution
FAQ
Is the newspaper admissible in court?
Yes, provided it is produced by an eIDAS compliant platform.
Can I edit the log?
No, any modification makes it invalid.
How long to keep?
At least as long as the signed document (10 years for commercial contracts).
Does the newspaper reveal personal data?
Yes (IP, user-agent, hours). Protect your access according to GDPR.
Can we share it with a third party?
Yes, via a verification link or PDF export.
Conclusion
The proof log is the legal key to electronic signature. Keep it carefully, and you will have a strong position against any challenge.
Try Certyneo to send, sign and track your documents online simply, quickly and securely.
Try Certyneo for free
Send your first signature envelope in under 5 minutes. 5 free envelopes per month, no credit card required.
Go deeper on the topic
Our comprehensive guides to master electronic signatures.
Continue reading about Sécurité
Deepen your knowledge with these related articles.

Is the electronic signature secure?
Encryption, authentication, audit trail: why electronic signatures are more secure than paper.

Protection of e-commerce customer data: GDPR compliance

Electronic certificate and digital signature
What is an electronic certificate, what is it for and what is the link with the digital signature?