Searching for Part 11 compliant e-signature software puts you in a frustrating position: most vendors claim compliance, almost none of them explain what that actually means, and the few that do describe their features in marketing language that obscures the technical details that actually matter during an FDA inspection. This guide cuts through that.
What follows isn't a ranked listicle. It's a framework for evaluating any e-signature platform against the specific technical requirements of 21 CFR Part 11, so you can ask the right questions and spot the gaps before you've signed a contract and started validation.
Key Takeaways
- "Part 11 compliant" is a claim, not a certification. Every vendor makes it. What matters is the specific technical controls the platform implements and how they map to the regulation text.
- The highest-risk gap to check: does 2FA happen at login only, or at the point of each signature? Part 11 Section 11.200(a) requires authentication components to be used together at the time of signing.
- Tamper-evident audit trails are non-negotiable. Ask how tamper evidence is technically achieved, not just claimed.
- Validation documentation (IQ/OQ/PQ protocols) must be available from the vendor. If they can't provide it, your QA team will write it from scratch. That's a significant burden.
- Purpose-built platforms for regulated industries carry less compliance risk than general-purpose e-signature tools with compliance add-ons.
- Total cost of ownership for a non-compliant platform includes the cost of validation rework, SOP workarounds, and the risk of a regulatory citation.
Why "Part 11 Compliant" Is a Marketing Claim, Not a Standard
There's no FDA certification for e-signature software. No third party issues a "Part 11 compliant" badge. Every vendor that makes this claim is self-certifying, and the claim has no defined minimum technical threshold. A platform that enables any electronic signature might call itself Part 11 compliant.
The actual standard is in the regulation itself: 21 CFR Part 11, which you can read at eCFR.gov. Subpart B defines electronic records requirements. Subpart C defines electronic signature requirements. These are the specific controls your platform must implement and your validation must verify.
For a complete walkthrough of what the regulation actually requires, see our FDA 21 CFR Part 11 compliance guide. This post focuses on how to evaluate whether a specific software platform genuinely meets those requirements.
The 7 Technical Requirements That Actually Separate Compliant from Non-Compliant
1. Two-Factor Authentication at the Point of Signing
Section 11.200(a) requires that non-biometric electronic signatures employ "at least two distinct identification components such as an identification code and password." This authentication must happen at the time the signature is executed.
The compliance gap that appears most often in practice: many platforms implement 2FA only at login. A user authenticates once when they open the application, then can sign any number of documents without re-authenticating. This fails the Part 11 requirement, which is specifically about the act of signing, not just accessing the system.
Ask the vendor directly: what happens when a user clicks "sign"? Is there a step where the user must enter both authentication components? If the answer is "they just click confirm," that's not Part 11 compliant signing.
The gold standard is password plus TOTP (Time-based One-Time Password, like an authenticator app code) required at each signing event. This is what Section 11.200(a) actually contemplates.
2. Signature Manifestation with Meaning
Section 11.50 requires that every signed electronic record display three things:
- The printed name of the signer
- The date and time when the signature was executed
- The meaning associated with the signature (such as "approval," "review," "authorship," or "responsibility")
The "meaning" requirement is commonly missed or treated as optional. But it's a hard requirement. A signature block that shows "Jane Smith, 2026-03-27, Signed" doesn't satisfy Part 11 because "Signed" isn't a regulated meaning. The platform must support configurable signature meanings that match your SOPs.
3. Signature-Record Linking That Can't Be Broken
Section 11.70 requires that electronic signatures be "linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means."
In practice, this means the signature must be cryptographically or procedurally bound to the specific document content at the time of signing. If the document can be modified after signing without invalidating the signature, Section 11.70 is violated.
Ask the vendor: if someone edits the document content after it's been signed, what happens to the existing signatures? The answer should be that the signature is invalidated or that the system prevents post-signature modification. If the system allows edits without invalidating signatures, that's a compliance failure.
4. A Genuinely Tamper-Evident Audit Trail
Section 11.10(e) requires "computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records." The word "independently" is doing a lot of work here: the audit trail must exist separately from the data it protects, not just as a field in the same database table.
More importantly, "secure" audit trails (the word used in the regulation) means tamper-evident. The audit trail must detect unauthorized modification. Ask specifically:
- Can any user, including system administrators, delete or modify audit trail entries?
- How is tampering detected? (The answer should be a technical mechanism, not "we have access controls.")
- Does the audit trail capture the original value before a change, or just the new value?
- Is there a reason-for-change field, and is it mandatory?
For more detail on what a fully ALCOA+-compliant audit trail looks like technically, see our ALCOA+ audit trail software requirements guide.
5. System Access Controls and Unique User Identification
Section 11.10(d) requires that systems "limit system access to authorized individuals." Section 11.100(a) requires that electronic signatures be "unique to one individual and not reused by, or reassigned to, anyone else."
These requirements seem basic, but they have specific implementation implications:
- No shared accounts. Every user needs their own credentials. Generic accounts like "lab-team@company.com" violate attribution requirements.
- Account lifecycle management. When an employee leaves, their account must be deactivated, not deleted (you need to preserve the audit history) and not reassigned to someone else (the signature uniqueness requirement).
- Session timeouts. Section 11.10(d) is interpreted to require automatic session termination after a period of inactivity.
- Account lockout after failed attempts. Unlimited login attempts create brute-force risk. The system should lock accounts after a defined number of failures.
6. Validation Documentation from the Vendor
Under 21 CFR Part 11 and FDA's Computer Software Assurance (CSA) guidance, your organization is responsible for validating the e-signature software before putting it into regulated use. This means IQ, OQ, and PQ protocols, a traceability matrix mapping software features to regulatory requirements, and ongoing change control documentation.
The practical question is how much of this burden the vendor takes on for you. Vendors that provide pre-written IQ/OQ/PQ templates, regularly updated as the software changes, dramatically reduce validation effort. Vendors that provide nothing leave your QA team to write validation protocols from scratch.
This is a cost of ownership question. Ask before purchase: what validation documentation do you provide? How is it updated when the software changes? How do you notify customers of changes that require re-validation?
For a deeper look at the validation process, see our guide on validating an e-signature system under CSA.
7. Long-Term Record Retention and Audit Trail Export
Section 11.10(c) requires that systems provide "protection of records to enable their accurate and ready retrieval throughout the records retention period." For clinical trial records under EU CTR 536/2014, that period is 25 years.
Practical requirements this creates:
- The platform must support retention periods matching your regulatory requirements
- Records and their audit trails must be exportable in non-proprietary formats that can be read without the original software
- The vendor must have a credible business continuity position: what happens to your records if the vendor goes out of business?
SaaS platforms often have terms that give you access to your data while you're a subscriber. Read the contract carefully for what happens to your data if you cancel or if the company ceases operations. For 25-year retention requirements, this isn't hypothetical.
Questions to Ask During Vendor Evaluation
Translate the above requirements into direct questions you can put in an RFP or ask during a product demo. The complete Part 11 vendor selection checklist has the full regulation-referenced version. Here's the compressed version for initial conversations:
- Does 2FA happen at login only, or at each signing event?
- What signature meaning options are available and can they be customized?
- What happens to existing signatures if a signed document is modified?
- Can any user delete or modify audit trail entries?
- Does the audit trail capture the original value before a change?
- Is there a mandatory reason-for-change field for data modifications?
- How is the audit trail's tamper evidence achieved technically?
- What validation documentation do you provide?
- What are the retention period options and what formats can records be exported in?
- What happens to my data if I cancel or if your company closes?
Common Traps to Avoid
The "We're Part 11 Compliant" Trap
As discussed above, this claim alone means nothing. Every vendor makes it. Push past the claim to the specific controls. Ask which sections of Part 11 their platform addresses and which sections you're expected to address through your own procedures.
The Add-On Module Trap
Some platforms offer Part 11 compliance through a paid module that adds on top of a standard e-signature product. The compliance controls are applied at the module layer, not the platform layer.
The risk here isn't that the module doesn't work. It's that the underlying system wasn't designed for regulated use, and there may be ways to bypass the compliance controls by using the platform without the module enabled. During validation, you'll need to verify that every relevant action in the system goes through the compliance layer, which is a more complex validation exercise.
Purpose-built platforms embed compliance into the core product. There's no way to use the system without the Part 11 controls because they aren't optional layers. This is architecturally simpler to validate and operationally less risky. For a detailed comparison, see our comparison of add-on modules versus purpose-built platforms.
The "We Handle Compliance" Trap
Some vendors pitch their solution as taking compliance off your plate entirely. This is misleading. The regulated organization is always responsible for its own compliance. A vendor can reduce your burden significantly by building compliant features and providing validation documentation. But your quality team still needs to validate the system, write SOPs for its use, and ensure it's configured correctly in your environment.
Vendors that suggest otherwise are either overselling or haven't worked with regulated customers who've had FDA inspections.
The Price Optimization Trap
The cheapest Part 11 e-signature option isn't cheapest when you factor in total cost of ownership. A platform with no vendor-provided validation documentation might cost less per seat, but writing IQ/OQ/PQ protocols from scratch for a quality team can represent 40-80 hours of work. If that platform changes with every software update, that validation work repeats.
Factor in: initial validation effort, ongoing revalidation frequency, SOP development and maintenance, training, and support from a team that understands regulatory environments.
What Purpose-Built Compliance Looks Like
The platforms that hold up best under inspection scrutiny share a few characteristics. They weren't general-purpose tools that added compliance features. They were designed from the beginning for regulated environments where the audit trail, the 2FA, and the signature manifestation aren't features you can toggle on or off.
That means when a new user is created, 2FA is required, not optional. When a document is signed, the system enforces authentication at the signing step regardless of how long ago the user logged in. When a record is modified, the original value is captured automatically in the audit trail. When a signature is applied, the signature meaning field is required, not skippable.
These behaviors are the baseline for genuine Part 11 compliant e-signature software. The difference between a platform that's genuinely built for this environment and one that's retrofitted shows up clearly during validation, even more clearly during an inspection.
Certivo was built specifically for clinical research, pharma, and life sciences organizations that need FDA 21 CFR Part 11 compliance without the overhead of configuring a general-purpose tool. Password plus TOTP is required at each signing event. SHA-256 hash chains protect every audit trail entry. Validation documentation ships with the platform. See the compliance overview for the full technical specification, or start a free trial to test it yourself against your own evaluation criteria.