Blog
Personal Identifiable Information (PII)

Personal Identifiable Information (PII)

Information that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification.

main blog image link
Legislation
4 min
read

Amended Law Brings Updated & Improved Online Notarization to New York

Notaries in New York are now authorized to perform remote online notarizations (RON).
main blog image link
Use Cases
6 min
read

Transform Your Business by Digitizing Spousal Consents

You're just a few clicks away from transforming your business by digitizing your spousal consents for plan distribution entirely online through Notarize.
main blog image link
Use Cases
5 min
read

What Legal Teams and Businesses Should Know About Ethical Data Mining and Use

Using and mining data responsibly should be a top priority for all businesses. This is what legal teams and their companies need to know.
main blog image link
Use Cases
5 min
read

Why Law Firms Should Use Blockchain Technology

Blockchain is more than a buzzword these days. This is why blockchain is relevant to law firms and why they should be utilizing and supporting it.
main blog image link
Use Cases
4 min
read

Strategies to Stay Ahead: What Is Digital Wealth Management?

At its core, digital wealth management is the process of automating services for clients so that wealth advisors can make investing efficient for customers. Learn more.
main blog image link
Use Cases
5 min
read

The Rise of Financial Services Automation

Document digitization and process automation allows organizations to break free from the weight of paper-based documentation and streamline their entire system.
main blog image link
Use Cases
4 min
read

What Law Firms Need to Know About Cybersecurity

Cybersecurity for law firms is vital, especially due to the confidential nature of the business. Here's how to mitigate the risk of hacking.