More than a digital squiggle

May 2013 Access Control & Identity Management

LAWtrust, the first accredited Authenticated Service Provider in South Africa, says there is a great deal more behind electronic signatures (including advanced electronic signatures) than mere aesthetic quality – legally this information is considered evidence and can be of huge significance in business.

There is more to electronic signatures than a business reducing its carbon footprint or complying with corporate governance regulation. Its legal implications are often taken for granted say legal experts.

”From a legal perspective, a signature is evidence; it is evidence that you use your name for something and adopting the content and record,” explains Mark Heyink, a guest speaker at a recent information session hosted by LAWtrust and Datafinity focused on eSignatures.

The session offered an explanation of the difference between a digitised signature, digital signature and biometric signature, and extracted the legal ramifications of use in business.

Technically, these signatures are defined as:

* Electronic signature: data attached to, incorporated in, or logically associated with other data which is intended by the user to serve as a signature, including any e-signature, digitised as well as digital.

* Digitised signature: digital reproduction of a handwritten signature e.g. a faxed signature, a picture of a signature, a signature capture tablet.

* Digital signature: technology-specific electronic signature made by using a public / private key encryption process to ensure integrity.

* Biometric signature: general description for an electronic signature made with a biometric (body measurement such as a fingerprint) as an act of authentication/acceptance.

LAWtrust affirmed that the e-signature has become ubiquitous in its application and, despite a lack of legal framework for regulation, has clear advantages that have increased its mainstream appeal.

“The advantage of electronic signatures, including advanced electronic signatures, is that the identity is evident. In other words, legally, any mark of any nature recognised as an identity is immediately apparent or obvious. Today, the e-signature is so well established that it is inevitably accepted and content adopted,” adds Heyink.

Benefits associated with the use of electronic signatures include the reduction in the cost of administration, a reduction in time delays from physical signatures, cost reduction estimated to be in the region of 50% and the convenience of instant, widespread approval.

For a business, the investment in electronic signature technology and applications translates into measurable value such as automated workflow, faster processing and turnaround times, better customer service, less risk to the organisation and users because of the established security and audit trail. IT security companies in the business of electronic signature and automated document capture solutions affirm the importance of minimising human intervention and reducing paper use to boost the efficiency of business.

Paul Wright, sales director at Datafinity, says businesses invest billions in ERP, ECM and electronic mail, but capturing a ‘wet’ signature seriously impedes the value of these solutions in the workplace. “Signature pads find application at counters and PoS (point of sale) terminals. The inherent benefit of this technology is being able to reduce paper receipts and aid businesses by recording and maintaining digital records. These devices feature LCD technology, are secured, facilitate complete biometric capture and offers the ability to display the document being signed on the device itself,” adds Wright.

The main objective in using signature pads at counters and cash registers is to reduce to a minimum or completely eradicate the paper receipts that need to be stored in business transactions based on signed documents. “As a general rule, our products are used with credit card payments or when payment is made in the field, as well as with multiple services (mobile top-ups, car rentals, self-service situations, etc,) and also at bank counters in order to sign deposit, withdrawal and money transfer slips,” he added.

Legal experts went a step further in their deliberation and advised companies to take heed of the fact that electronic signatures are legal and there are specific considerations that must be kept in mind in order to enjoy the benefits.

Maeson Maherry, solutions director at LAWtrust, said in order to reduce personal and company risk, a signature must be a positive act of acceptance, visible and clear, must identify the individual and must be verifiable. “A good signature will fulfil all these criteria and ultimately be verifiable impartially, forensically and mathematically.”

“We are moving into a new era of signatures and legal identification. Infrastructure like the Signature Pad adds substantial value in providing users with an easily managed device that eliminates the need to manually introduce data, that enhances CRM and ERP, and encourages audit control and manageability,” added Heyink.

For more information contact LAWtrust, +27 (0)11 731 8238, [email protected], www.lawholdings.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Embracing contactless access solutions
HID Global Access Control & Identity Management
There has long been a discussion of the perils and virtues of authentication factors. Is it more secure to use something we have (a key card), something we know (a password), or something we are (biometrics)?

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
Facial recognition in national security
Access Control & Identity Management Government and Parastatal (Industry)
As global security challenges evolve, facial recognition technology provides a vital edge by turning our unique identities into powerful assets for national defence and changing a sea of anonymity into a line of defence.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...