





Finding and interpreting the Evidence package
The evidence package is included with every document signed through Scrive and provides a detailed, tamper-evident record of when and how the signing occurred. This package supports the legal validity of signed documents and ensures their integrity—allowing anyone to verify that the document has not been altered since signing.
Common signing, including KSI and PKI sealing
Embeds the evidence package directly into the signed PDF file. This means that users signing receive a self-contained PDF that includes all necessary verification and evidence data embedded in the file.
Qualified Electronic Signature (QES) signing
Follows a different approach. In this case, the evidence package is not embedded within the signed PDF file. Instead, QES signing produces a ZIP archive for the sealed document, containing two separate files:
A QES-signed PDF file.
A KSI-sealed evidence PDF file which includes the verification and embedded complete evidence package.
Each evidence package includes:
Verification page: Appended to the end of each signed PDF, this page provides a high-level summary of the signing process along with the Scrive seal stamp. It includes details about the document’s author, each signatory, and the timestamps of all signing events—based on Scrive server logs.
Embedded HTML attachment: The full evidence log is included as an embedded HTML file attachment within the signed PDF, offering an in-depth view of all activities surrounding the signing process.

Document integrity
A file claimed to have been signed in Scrive is only trustworthy if it remains unaltered. Any modification to the document—such as adding annotations, highlighting text, or compressing the PDF—will render it no longer an original. This is because even the smallest change affects the underlying data, breaking the digital seal that protects the document’s integrity.
Scrive supports two industry-standard methods for sealing and verifying the authenticity of signed documents. Read more here.
Scrive stores an original copy of each document until it is deleted by the owner. Any exact, unaltered digital copy of that document is still considered an original.
To verify the integrity of your document—regardless of whether it was sealed using PKI or KSI—please see this article.

View the Evidence package in a PDF viewer
An easy way of viewing the embedded HTML evidence package is to open the original document in e.g. Adobe Acrobat Reader. Click on the attachments icon to show the list of attachments which together make up the evidence package. All the attachments are in a HTML format. Double-click on a file to open it in your default browser.
The attachment consists of:
Evidence Quality Framework – about the framework Scrive uses for evidence quality.
Service Description – a detailed description of how Scrive works.
Evidence Log – all events associated with this document, in detail.
Evidence of Time – samples from the Scrive server clocks and statistical analysis of the clock error (to make it possible to determine how exact the Scrive clocks are).
Evidence of Intent – screenshots from the devices (computer/phone/tablet) the signing individuals used to sign. (This works most of the time, but not always, as web browsers can be unpredictable.)
Digital Signature Documentation – a detailed description of how Scrive’s blockchain-based digital signing works; the basis for securing the integrity of documents signed in Scrive.
Quality of Scrive E-signed Document – an explanation on how Scrive fulfils evidence quality requirements.
The “last updated” date is when Scrive last changed something in the template text for the attachment. The attachment itself was generated when the last signing party signed.

Information in the Evidence log
Questions about who signed a document, when it was signed, and how it was signed can all be answered using both the Evidence log and the Evidence of Intent.
Evidence log (Appendix 3)
This file contains all events that Scrive has been able to record about the document, up until the last person signed it. Thereafter, the file is locked. Or rather: if the file is changed after this point in time, it is not what the signatories signed and it is therefore no longer an original. It is not possible to verify the integrity of the document if it has been changed. See more above in the section on “Document integrity”.
In the Evidence log, you'll find key information, including the signatory’s name, email address and/or phone number, along with the timestamp and IP address of the device used to view the document.
The timestamp is in the leftmost column. Scrive always uses time in the UTC time zone. The CES column is the last time we analysed the clock error (which in turn results in the +/- X ms in the leftmost column). The IP address is in the third column.
It should be noted that an IP address is not a very good way of identifying an individual. A very common case is that many individuals, sometimes whole cities, share a single IP address. However, the user behind the IP address might be located somewhere completely different as they may be using a VPN.

Evidence of Intent
The Evidence of Intent file normally contains images of what the signatories saw on their screen. As this is a client-side script, it is sometimes impossible to capture a screenshot and due to browser settings or browser bugs,. When it works, it is however what the signatory saw. The intent of capturing and storing these screenshots is to prove that the agreement that was signed was shown and that the button used to sign did not say anything other than “sign” (in one or another language).