Electronic signatures in the digital economy

Access & Identity Management Handbook 2015 Access Control & Identity Management, Security Services & Risk Management

With the increasing digitisation of businesses, a new solution for document signing is required. The old method involving paper, ink, postal services and couriers is simply too slow and cumbersome to deal with the velocity of information that an organisation needs to process today.

Traditional methods of signing documents are also costly, environmentally unfriendly, and expose the organisation to the risks of fraud and identity theft.

However, electronic signatures are emerging as the silver bullet that addresses all of these woes. Although not all digital signatures are the same, the concept behind these signatures is remarkably simple, yet very effective.

Electronic signatures use cryptography to tightly connect a unique individual with their endorsement, or 'sign-off', on a particular document. This leaves no room for tampering, forgery or modifying documents maliciously. It guarantees the validity of the document and the identity of the relevant individuals who have signed the document.

Privacy and security can be further enhanced by requiring the use of two-factor authentication in order to open documents – such as a password delivered via SMS, for instance.

Another key differentiator is that documents using electronic signatures can be more easily routed into workflow systems. This helps to cut down on administrative tasks, and reduces the chances of error as a document winds its way throughout the organisation. Individuals are able to increase their productivity by digitally signing documents from wherever they may be, using their smartphones or tablets. Furthermore, electronic signatures also have a positive environmental benefit as less paper is required and less energy is used to transport documentation.

How do electronic signatures work?

Firstly, an individual creates their unique and verified electronic signature. In South Africa, this can be accomplished through a division of the South African Post Office. This signature carries certain key properties – such as an ID number – which will render it unique and impossible to copy.

Documents that require signatures can be directed at certain individuals, people who are stipulated to sign the document. In these cases, the document is only ‘completed’ once all the stipulated individuals have signed the document. Other metadata, such as the designation of the individual, can be published; and viewers of the document can see certain properties, like the date and time at which individuals signed it.

From a legal perspective, the Electronic Communications and Transactions (ECT) Act 25 of 2002, saw South Africa following the global trend of recognising the legitimacy of electronic signatures. While electronic signatures are not valid for every type of transaction (such as property purchases), electronic signatures are legally acceptable and binding for almost all private and business documentation.

By reducing the possibility for fraud, organisations help to protect themselves against a host of cybercrime risks; and by embedding electronic signatures within their operations, they reduce the costs associated with manual signing and manual processing. Perhaps most importantly, electronic signatures raise the stature of the organisation and represent high levels of professionalism.

As everything else in the business becomes digitised, one has to wonder why we are still scrawling 'easy-to-forge' patterns on pieces of paper.

For more information contact DocuSign, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...