200+ law companies trust Penneo
Know Your Customers (KYC) in 5 minutes
If your company is subject to the Anti-Money Laundering Act you have probably asked your customer to scan copies of their passports, Drivers License or similar ID. It is both cumbersome, time consuming and insecure. With Penneo you customers can handle everything using their National E-ID directly from their computer or smartphone og still adhere to the AML/KYC rules.
Get agreements signed faster
Let the client sign contracts and forms from a computer or smart phone. It is much easier and the signed documents will land directly in your inbox. As a result you can conclude more cases faster which benefits both lawyer and client.
No more excuses or delay
When you are working with debitors is critical that you can conclude payment agreements or voluntary settlements easily and quickly. With Penneo you can handle the entire process while you have the client on the phone. And you can even see whether they have received, read and signed the documents and when.
Integrate Penneo with your current tools
Any document should be signed with Penneo
- Founding documents
- Letters of intent
- Consultancy reports
- Legal contracts
- Advice letters
- Litigation documents
At Penneo, we work a lot with compliance and legal aspects. Although e-signature is well-democratized nowadays and can potentially be submitted as evidence in any law process, only advanced types of signature will provide a good assurance with important information such as signer's identity and document authenticity. Signatures made with Penneo, combined with authentication system and high security are more compliant because of the legally recognized evidences it contains.
At Penneo, we work hard to make sure our solution is the safest possible. From authentication to encryption, everything we provide is following the highest security standards. Penneo needs to be irreproachable on both technical and operational safety. The technical safety concerns the principles and technologies used to produce the signed document while the operational security concerns security in hosting, data processing and internal security procedures.