{"id":653,"date":"2023-05-25T23:00:00","date_gmt":"2023-05-25T23:00:00","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/25\/4-features-that-make-e-signatures-safe\/"},"modified":"2023-05-25T23:00:00","modified_gmt":"2023-05-25T23:00:00","slug":"4-features-that-make-e-signatures-safe","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/25\/4-features-that-make-e-signatures-safe\/","title":{"rendered":"4 features that make e-signatures safe"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-351449 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22134734\/4-Security-Capabilities-of-an-e-Signature.jpg\" alt=\"4 Security Capabilities of an e-Signature\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22134734\/4-Security-Capabilities-of-an-e-Signature.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22134734\/4-Security-Capabilities-of-an-e-Signature-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22134734\/4-Security-Capabilities-of-an-e-Signature-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>E-signatures provide a fast and convenient way to get important documents signed. However, it\u2019s important that electronically signed documents are kept secure and can have their validity proven when necessary.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">There are several features of e-signatures that make this possible which we\u2019re going to explore. First, let\u2019s take a look at the basics of e-signatures, their benefits, and the different types you can use.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">What is an e-signature?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">An e-signature, or electronic signature, is a way of signing and authenticating an electronic document.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Electronic signatures have rapidly become a legitimate alternative to wet signatures, i.e. signing a document by hand. There is even legislation enshrining the use of them in law, such as the law regarding e-signatures in Canada and the Federal ESIGN Act of 2000 in the US.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">E-signatures are a viable legal replacement for handwritten signatures and are used in many industries. They are a convenient way to sign a wide range of documents, including non-disclosure agreements (NDAs), purchasing contracts, and insurance paperwork.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">What are the benefits of using e-signatures?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">With the rise of cloud-based technologies, it has become more common for businesses to send and receive large volumes of their paperwork digitally. Using e-signatures complements this. They allow documents to easily be sent and signed without the need to print off a physical copy and send it through the mail.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">By using e-signatures, businesses can streamline their digital workflows and speed up processes across the business, from hiring and onboarding to drafting and sending purchase orders.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Documents that have been signed electronically also take up much less storage space, as there\u2019s no need for rooms full of filing cabinets. E-signatures also help to reduce paper waste, reducing the carbon footprint of an organization.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">They can provide an added layer of security compared to wet signatures, provided they\u2019re used in the right way. Digital documents can be more easily tracked throughout their lifecycle, and the digital nature of e-signatures means that their validity can be proven more easily than handwritten signatures in many cases.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">What are the different types of e-signatures?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">There are two main types of electronic signature available for use, each providing varying levels of security and legal validity.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Standard Electronic Signature (SES)<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A standard electronic signature is one of the most common types of e-signature used. An SES doesn\u2019t use any kind of cryptographic encryption. It instead relies on the signer\u2019s intent to sign as proof of validity.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The limited security protocols associated with this type of signature make it easy to use but also easy to refute. A standard electronic signature may be deemed legally binding if it can be established that the signer\u2019s identity wasn\u2019t falsified, but this can be difficult to prove.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Advanced Electronic Signatures (AES) &amp; Digital Signatures<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Digital signatures and advanced electronic signatures provide a more secure alternative to standard electronic signatures. They require the signer\u2019s identity to be confirmed before the signing takes place. This makes it easier to prove their authenticity in court.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Verification can be made using a personal PIN or one-time passcode or by using an online e-signature platform.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">4 security capabilities of an e-signature<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A recent survey showed the majority of business owners and individuals who opted not to use e-signatures did so because of concerns over security or privacy, such as intervention from malicious actors.<\/p>\n<figure id=\"attachment_351450\" aria-describedby=\"caption-attachment-351450\" style=\"width: 300px\" class=\"wp-caption alignright\"><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-351450 img-responsive\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22135118\/Reasons-business-owners-dont-choose-esignatures-300x212.png\" alt=\" A graph showing the reasons why businesses and individuals choose not to use e-signatures.\" width=\"300\" height=\"212\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22135118\/Reasons-business-owners-dont-choose-esignatures-300x212.png 300w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/22135118\/Reasons-business-owners-dont-choose-esignatures.png 512w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><figcaption id=\"caption-attachment-351450\" class=\"wp-caption-text\">Source<\/figcaption><\/figure>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">However, there are several important security features of e-signatures and their associated software that can help to combat this stigma.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Document Security<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Documents that contain digital signatures, in particular, are often protected by document security. These features will go a long way to proving the authenticity of a digital contract and the intent of all parties involved to sign.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">For example, many e-signing platforms will lock a document once the signing process has begun. This means that if the document needs to be altered in any way, all existing signatures on it become invalidated, and the revised document must be signed again.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The best e-signature solutions will also secure the document once it has been signed by all relevant parties. This prevents the document from being tampered with and further helps prove its validity.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Encryption<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Many e-signing platforms use asymmetric key cryptography to ensure the content of the document hasn\u2019t been altered between signatures and won\u2019t be altered afterward.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Each party can use an encrypted key to validate the various versions of a digitally signed document. In most cases, a document that has been altered in between signatures will trigger an alert and will not open correctly. The signing process will therefore fail, and all parties will be required to resign the document.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Evidence-based Authentication<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Evidence-based authentication is used to prove the authenticity of an e-signature. This is achieved by sending the document to a device or account that is known to be controlled by the intended signatory.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">In order to further boost security, a passcode may be required to access the document. For example, a document may be sent by email, with a passcode sent separately by SMS, requiring the signer to have access to both accounts.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The aim of evidence-based authentication is to prove the identity of the signer, which, when combined with asymmetric encryption, can prove the validity of an e-signature and its associated document.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Audit Trail<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The best e-signing platforms will build a comprehensive audit trail of the signing process. This will help you to prove exactly when and how a signer interacted with a document. A comprehensive audit trail can help prove that documents haven\u2019t been tampered with and that the person who signed was the intended signer.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Details that can be captured to form a strong audit trail can include IP addresses, date and time stamps, and the length of time that documents were viewed.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Digital signatures are secure<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If you\u2019re signing documents electronically, whether it\u2019s a purchase order or a standard waiver (like this waiver template Word document), you need to be sure that the process is secure and that the document can be proven to be valid.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">With the right e-signature platform, this doesn\u2019t need to be a concern. Security features such as asymmetric encryption and evidence-based authentication can ensure that the identity of signers is proven and that the documents are not tampered with during and after the signing process.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A comprehensive audit trail can help you to prove the validity of the document and the authenticity of the signatures on it. All of these measures combined will ensure that your electronically signed documents are as safe as can be.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/security-capabilities-of-esignatures\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] E-signatures provide a fast and convenient way to get important documents signed. However, it\u2019s important that electronically signed documents&hellip;<\/p>\n","protected":false},"author":1,"featured_media":654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,599,600,19,2],"tags":[],"class_list":["post-653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-digital-signature-security","category-esignature","category-security","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=653"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/653\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/654"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}