The legalities of the digital signature

1 March 2019 Editor's Choice, Information Security, Security Services & Risk Management

Digitalisation and digital transformation have seen a significant organisational shift from paper-based processes and procedures. Most organisations have adopted alternative methodologies for signing documents to ensure auditable document trails while minimising the costs associated with paper-based transactions and the risks of fraud and identity theft. However, few recognise the difference between an electronic signature and a digital signature – a critical difference that can have an impact on the legalities and security of any document trail.

Rian Schoeman
Rian Schoeman

“The electronic signature is usually defined as an identifying mark that can be anything from a photograph or a scan of a signature to a squiggle made on a mobile phone or tablet,” explains Adv Rian Schoeman, head of Legal, LAWtrust, an Etion company. “It isn’t secure. In fact, the electronic signature is at risk of fraud as it is easy to copy, move and adjust. This is particularly true of poorly executed signatures that are not easily identifiable.”

To ensure deeper security, particularly with regards to highly sensitive or complex records and contracts, digital signatures are more efficient and reliable. A digital signature ensures an auditable, provable trail that can be clearly linked to a specific person and identity. Usually, a digital signature can only be used once the individual has undergone a process of identity verification which assures all parties that the right person has signed the right documentation.

“When you open a digitally signed document with a solution such as Adobe PDF reader, selecting the signature will reveal the digital certificate that outlines the individuals name, surname, and other specified identifying factors such as an email address,” says Schoeman. “These signatures are certified and legally binding.”

An electronic signature, paper-based signature, photograph or email signature may have legal weight, but proving that the person’s intention was to be bound by that signature is an involved, complex process. A digital signature does not face the same challenge. The identify verification process ensures that much of this evidence is built into the signature. While the legal process will require that the organisation prove who made the signature, in the event of a query, the process is simplified by the digital trail and embedded forensic evidence.

“To be completely assured of digital signature security, South Africa’s Electronic Communications and Transactions Act (ECTA) recognises the concept of an Advanced Electronic Signature (AES),” adds Schoeman. “This is similar to a digital signature in that it is based on a digital certificate, but it requires face-to-face verification. This ensures the person receiving the document that the signer (signatory) of the document has been verified in person.”

When a signature is disputed, it is the person who queries the signature who has to prove that it is invalid. For large organisations that enter into numerous contract agreements, this is a valuable tool as it assures them of a measure of security when signing agreements.

“To provide both enterprise and its legal department with peace of mind, it is recommended that all digital contracts or agreements are signed using a digital signature,” concludes Schoeman. “This will not only alleviate unnecessary issues that could occur further down the line but will provide all parties with the right levels of assurance from the outset.”

For more information go to http://www.etion.co.za/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How is technology changing the industry?
Editor's Choice
SASA and the International Code of Conduct for Security Providers Association (ICoCA), a Geneva-based organisation, will hold a consultative workshop in South Africa in September to discuss how technology is changing the industry and the associated risks.

Read more...
Innovation and security go hand in hand
Technews Publishing Facilities & Building Management Security Services & Risk Management
In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...