Need Help?
0844 736 1962
Follow us on facebook :  


The technology

Understanding Technology, Methods and Authentication

Electronic signature capture is a technology for signing electronic document files with a handwritten signature. The use of this technology allows for the complete elimination of the mailing, storage, filing, copying, and retrieval of paper documents. This will save your business time and money.

As businesses continue to replace paper documents, contracts, and forms with more efficient and cost-effective electronic substitutes, electronic signature technology becomes an increasingly important investment. The cost and time savings of doing business electronically are evident across many sectors and industries, yet many companies are still choosing which technology or method is best suited to their needs. Creating, signing, transmitting, and storing any and all documents electronically and in such a way as to be legally-binding can seem like a daunting task.

What is an electronic signature?

"Electronic Signature" means data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication.

That means an electronic signature which meets the following requirements:

a )

it is uniquely linked to the signatory;

b )

it is capable of identifying the signatory;

c )

it is created using means that the signatory can maintain under his sole control; and

d )

it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable.

Several different methods and technologies exist for attaching “electronic signatures” to documents according to these stipulations. Two common types of signature technology that are widely available yet differ greatly in substance are PIN/Password signature stamps, PK) and digitized handwritten signatures.

A PIN/Password stamp inserts a single fi xed signature image into each signed document when a user types a password or PIN. Digitized handwritten signatures are captured with special pen-and-tablet systems that convert a user's signature accurately into pen events or a summary image.

These methods have different ramifications for security and authentication.