The legalities of the digital signature

1 March 2019 Editor's Choice, Information Security, Security Services & Risk Management

Digitalisation and digital transformation have seen a significant organisational shift from paper-based processes and procedures. Most organisations have adopted alternative methodologies for signing documents to ensure auditable document trails while minimising the costs associated with paper-based transactions and the risks of fraud and identity theft. However, few recognise the difference between an electronic signature and a digital signature – a critical difference that can have an impact on the legalities and security of any document trail.

Rian Schoeman
Rian Schoeman

“The electronic signature is usually defined as an identifying mark that can be anything from a photograph or a scan of a signature to a squiggle made on a mobile phone or tablet,” explains Adv Rian Schoeman, head of Legal, LAWtrust, an Etion company. “It isn’t secure. In fact, the electronic signature is at risk of fraud as it is easy to copy, move and adjust. This is particularly true of poorly executed signatures that are not easily identifiable.”

To ensure deeper security, particularly with regards to highly sensitive or complex records and contracts, digital signatures are more efficient and reliable. A digital signature ensures an auditable, provable trail that can be clearly linked to a specific person and identity. Usually, a digital signature can only be used once the individual has undergone a process of identity verification which assures all parties that the right person has signed the right documentation.

“When you open a digitally signed document with a solution such as Adobe PDF reader, selecting the signature will reveal the digital certificate that outlines the individuals name, surname, and other specified identifying factors such as an email address,” says Schoeman. “These signatures are certified and legally binding.”

An electronic signature, paper-based signature, photograph or email signature may have legal weight, but proving that the person’s intention was to be bound by that signature is an involved, complex process. A digital signature does not face the same challenge. The identify verification process ensures that much of this evidence is built into the signature. While the legal process will require that the organisation prove who made the signature, in the event of a query, the process is simplified by the digital trail and embedded forensic evidence.

“To be completely assured of digital signature security, South Africa’s Electronic Communications and Transactions Act (ECTA) recognises the concept of an Advanced Electronic Signature (AES),” adds Schoeman. “This is similar to a digital signature in that it is based on a digital certificate, but it requires face-to-face verification. This ensures the person receiving the document that the signer (signatory) of the document has been verified in person.”

When a signature is disputed, it is the person who queries the signature who has to prove that it is invalid. For large organisations that enter into numerous contract agreements, this is a valuable tool as it assures them of a measure of security when signing agreements.

“To provide both enterprise and its legal department with peace of mind, it is recommended that all digital contracts or agreements are signed using a digital signature,” concludes Schoeman. “This will not only alleviate unnecessary issues that could occur further down the line but will provide all parties with the right levels of assurance from the outset.”

For more information go to http://www.etion.co.za/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...