QES Security: A Checklist for Sole Proprietors and Companies

A Qualified Electronic Signature (QES) is often perceived as a technical detail. A file, a password, a “Sign” button. Something you need for reporting, contracts, or HR documents—and preferably something you don’t want to think about too much.

And that’s actually a good thing. This is exactly how using a QES should feel: calm and routine, without the constant sense that every action hides a risk. But this convenience comes with one critical condition: the key must remain under control.

Because everything signed with a QES is legally considered the decision of its owner—regardless of who actually clicked the sign button or under what circumstances it happened.

That’s why QES owners often have the same questions:

Could someone sign a document without me?
Is it safe to give my key to an accountant?
What should I do if I lose my phone or suspect that someone else knows my password?

In this article, we take a detailed look at why QES security is basic business hygiene, where weak points most often appear, and what practical steps sole proprietors and companies can take to reduce risks.

Why QES security is not “paranoia” but basic business hygiene

The risks associated with a QES are often underestimated. It may seem like problems only happen in large companies or as a result of sophisticated cyberattacks. In reality, most incidents occur in ordinary, everyday situations — without hackers or complex schemes.

Typical consequences of poor QES security look like this:

  • a document appears that you don’t remember, but it is formally signed by you;
  • a dispute arises over a contract, order, or HR decision;
  • liability falls on the QES owner, even if the accountant or contractor acted;
  • fines or claims appear retroactively.

For a sole proprietor, a normal level of security means that only the owner has access to the QES, the key and password are not shared, and signing is done only from personal devices. The person knows where the key is stored, can check which documents were signed, and understands what to do if a device is lost or a compromise is suspected.

For a company, this is no longer enough. A system is required: separate QESs for signatories, clearly defined roles, access control, and a transparent document signing process.

Types of key storage and which are more secure

The level of QES security directly depends on where and how the key is stored. There is no universally perfect option, but different storage methods come with different levels of risk. Below is a brief comparison of the most common options.

Where the QES is stored What this means in practice Advantages Risks
Key file on a USB flash drive The QES is stored on an external USB device Can be physically disconnected from the computer Highest risk of loss or copying; the flash drive is easy to hand over, lose, or connect to someone else’s device; almost no access control
Key file on a computer The QES file is stored on a laptop or PC Simple option with no additional services The file can be easily copied or sent; risk of access if the device is hacked or lost
QES on a phone The signature is used via a mobile app Convenient for regular signing The phone becomes a single point of risk if lost, compromised, or access is shared
Hardware device (token) A physical device used to store the key Protection against software-based copying If the device is lost, access to the QES is limited; no centralized access management
QES in a secure app or cloud environment The key is stored in a specialized service with authorization Centralized access control; minimized copying; convenient management for businesses Security depends on the protection of the user account and device

The order in this table reflects how manageable access to the key is. That’s why a key file on a flash drive is the riskiest option, while a cloud-based or secure application solution is the most stable in terms of control, roles, and access recovery.

For businesses, QES security is primarily about access management, not the physical format of the key.

And one more important point. Regardless of the storage format, one basic rule always applies: one QES — one responsible person. For companies, this is critical: shared use of a single signature makes control and accountability impossible. For sole proprietors, this is also highly recommended—otherwise, any action performed with the QES is legally treated as an action of the owner.

In the Vchasno.QES dashboard, you can manage issued signatures and see who they belong to. And document signing can be conveniently organized in Vchasno.EDO — with a transparent process and clearly defined roles.

QES storage checklist for sole proprietors: 12 ✓

Most sole proprietors are confident that everything is fine. But when you look at the details, a few weak spots often appear—and they are easy to fix.

We created a basic checklist—not the maximum level of protection, but the minimum that significantly reduces risks.

  1. Do not store your QES in messengers, email, or open notes.
  2. Do not share your QES password in chats, emails, or voice messages.
  3. Create a separate, strong password specifically for your QES and do not reuse it elsewhere.
  4. Do not give your QES to an accountant or contractor, even temporarily.
  5. If an accountant prepares documents, sign them personally with your own QES instead of delegating the signature.
  6. Make a backup copy of the key and keep access to it only for yourself.
  7. Protect your laptop with a password and enable automatic screen locking.
  8. Enable screen lock on the phone you use to sign documents.
  9. Regularly update the operating system and applications on all devices.
  10. Sign documents only from your own devices, not from someone else’s or public ones.
  11. Review the document content before signing, even if someone else prepared it.
  12. Make sure you know where and how to quickly block or revoke your QES if needed.
Tip: Go through this list and fix at least three of the weakest points today. It takes only a few minutes, but these are usually the exact issues that cause most problems.

Company checklist: how to organize employee QESs and access

In companies, QES risks usually arise not from malicious intent but from organizational shortcuts. One signature is used by several people, both the accountant and manager know the password, documents are signed on behalf of the executive when they are unavailable. For tax authorities and counterparties, such signatures look exactly like actions of the QES owner.

A healthy model works differently:

  • each signatory has their own QES;
  • signatures are not shared, even within the team;
  • document preparation is delegated, not the signing itself;
  • roles are separated: who prepares, who approves, who signs.

In practice, this is simple: a manager prepares the document, a department head approves it, and the responsible person signs it with their own QES. No file transfers or password sharing.

Approving and signing documents is convenient in Vchasno.EDO, where everyone acts according to their role in the company, and Vchasno.QES allows you to centrally issue and manage employee QESs—without shared keys or access confusion.

Access policy

Even a large company doesn’t need multi-page instructions. One document that defines the rules is enough. Such a policy usually specifies:

  • where and how QESs are stored;
  • who has signing rights and within what authority;
  • a ban on sharing passwords and keys;
  • steps to take in case of an incident;
  • tracking who signed what and when;
  • who is responsible for access administration.

Take this list and create a one-page internal policy. For a start, this is enough—as long as the rules are actually followed.

QES compromise: how to recognize it and what to do

A QES compromise is not always a confirmed hack. More often, it’s the moment when you are no longer sure that only you had access to the key.

Typical warning signs:

  • a document appears that you don’t remember signing;
  • the QES was used by an accountant or contractor;
  • there were suspicious emails or messages.

In such situations, the sequence of actions is critical.

The basic algorithm is:

1

Stop using the QES immediately.

2

Block or revoke the certificate.

3

Review all documents signed in the recent period.

4

If necessary, notify responsible persons or counterparties.

If the QES was used by an accountant or contractor, review all documents from the period of access separately and change the working model going forward.

Tip: Save this algorithm in your notes or internal knowledge base. This is your Plan A in case of an incident.

Common mistakes and how to avoid them

Problems with QESs usually don’t come from complex schemes or deliberate violations. Most often, they are the result of everyday work decisions: giving access to an accountant, keeping the file close at hand. At the moment, this seems logical and convenient—but over time, these decisions create risks.

📌 Mistake 1. More than one person knows the QES password
The correct model is simple: no one except the QES owner should know the password or have access to the key. Document preparation can be delegated; signing cannot.

📌 Mistake 2. The QES or password is stored in messengers or email
The file or password ends up in a chat “so it doesn’t get lost.” But messengers are often connected to multiple devices, backups, or third-party services. In a secure model, the QES and password are stored only in a protected environment, accessible to one specific person.

📌 Mistake 3. There are no written rules for working with QESs in the team
Everyone relies on verbal agreements. When roles change, someone goes on leave, or an employee leaves, confusion arises: who had signing rights and from when.

📌 Mistake 4. One QES is used by multiple people
This happens in small teams: one executive or accountant QES “for everyone.” As a result, it’s impossible to determine who signed a document and under what circumstances. The correct model is a separate QES for each signatory according to their authority.

📌 Mistake 5. Documents are signed from someone else’s or random devices
Signing from a colleague’s computer or a public device may seem trivial, but it means losing control over the environment. A secure model means signing only from your own protected devices.

📌 Mistake 6. Incidents are not documented or analyzed
Even if something goes wrong, it’s treated as a one-off. Without documenting incidents and having a simple action plan, the same mistakes repeat.

📌 Mistake 7. No one is responsible for access
Even in a small company, there should be a person who understands who has which QES and what authority comes with it.

Summary

QES security starts with how work is organized, not with technical settings. It’s important to understand who signs documents, where the key is stored, and how access is controlled. Simple rules are enough: each QES has one responsible person, signing is not delegated along with the key, and actions in case of loss or compromise are defined in advance.

What to do starting tomorrow:

  • check where your QES is stored and who has access to it;
  • fix weak points using the QES security checklist above;
  • document a simple incident response algorithm.
Отримайте електронний підпис від «Вчасно.КЕП»

Want to bring order to QES usage in your business?

With Vchasno.QES, you can obtain QESs for sole proprietors or employees and control issued signatures.

Get a QES

FAQ

Can I store a QES key in Telegram or email?

No. Messengers and email are not designed for storing access keys. They are often connected to multiple devices, backups, and third-party services. In case of a leak, you lose control over who has access to the key. A secure model means storing the QES in a protected environment or on a device accessible only to the owner.

Can I give my QES to an accountant or contractor?

No. Even if it seems temporary or convenient. Legally, all actions performed with a QES are considered actions of the signature owner. Document preparation can be delegated; signing cannot. For companies, the correct model is separate QESs for each signatory according to their authority.

How can I tell if my QES may have been compromised?

A sign of compromise is any situation where you are no longer sure that only you had access to the key or password. For example, a document appears that you don’t remember, the QES was shared with someone else, or you lost a device where it was used.

What should I do if I lose a phone or laptop that had a QES?

You should immediately stop using the signature, block or revoke the certificate, and review which documents were signed recently. The faster you act, the lower the risk to your business or personal liability.

How do I revoke or block a QES certificate?

The certificate is revoked through the service where it was issued. After revocation, the signature becomes invalid and cannot be used to sign documents. This is a standard procedure in case of lost access or suspected compromise.

What are the most common mistakes when storing a QES?

Most often, it’s storing the key or password in chats, sharing the QES with others, using one signature for multiple people, and signing from someone else’s or unsecured devices. All of these make control harder and create legal risks.

How should QESs be organized in a company? Who needs which one?

Every employee with signing authority must have their own QES. Roles should be separated: who prepares documents, who approves them, and who signs. Shared signatures and common passwords are signs of a poorly organized process.

How can I safely sign documents from a phone?

The phone must be protected with a screen lock, and access to applications should be controlled. Signing should be done only from your own device, without sharing access. In case of phone loss, it must be clear how to quickly block the QES.