The latest in electronic signature technology

Access & Identity Management Handbook 2012 Cyber Security

Electronic signature capture is a technology for signing electronic document files with a handwritten signature. As businesses continue to replace paper documents, contracts, and forms with more efficient and cost-effective electronic substitutes, electronic signature technology becomes an increasingly important investment.

Companies must carefully research available electronic signature solutions and ensure they choose the correct one for their business needs – guaranteeing return on investment and cost, and time savings.

The Omega LCD signature pad is a signature capture device. The device is small and compact, and its appealing design is already setting trends at POS stations. More importantly for forensic audit purposes, the Omega captures data of the highest quality, which automatically results in an electronic signature acceptable in terms of the ECT Act (Electronic Communications and Transactions Act)

Developed and designed by signotec GmbH, and supported locally by Brand New Technologies, the slim signature pad offers a flat surface without restricting edges between the sensor and the housing, making for ultra-ergonomic signing. The pen and sensor convey a feeling similar to writing on paper, and the rounded sides allow the heel of the hand to transition smoothly from signature tablet to table without disrupting the signing process.

Additional functionality includes:

* At a sampling rate of 500 samples per second, directional, speed, and pressure coordinates from the signature can be digitised and recorded at an unsurpassed frequency.

* Data transmission from pad to PC is secured, preventing biometric characteristics from being intercepted.

* A special sensor with robust surface allowing signatures to be accurately captured for many years.

* Display resolution of 640 x 480 pixels providing outstanding display of graphics and text.

* Scrolling functionality for graphics.

* Two adjustable lights indicating the device status to the user.

* Ten freely programmable memory spaces on the pad for storing recurring content, offering a speed benefit for the graphics layout as these are not repeatedly loaded onto the pad but instead simply retrieved.

* Internal storage can also be used for slide shows, running independently, without connection to the software.

* Customisation of the external case, including customised colours and client logos.

* Free software suite with the signoPAD-API, signoIntegrator, signoImager and a MS Office add-in.

For more information contact Brand New Technologies, +27 (0)11 450 3088, danica@bntech.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Ensure cybersecurity at the edge
Issue 9 2020 , Cyber Security
Organisations must be aware of the increased need to protect the edge of the network and prioritise cybersecurity before an attack happens.

Read more...
Protecting ICS and SCADA systems
Issue 9 2020 , Cyber Security
Check Point Software´s new rugged gateway secures industrial control systems and critical infrastructures against the most advanced cyber-threats.

Read more...
Cyber defence in an era of digital dependency
Issue 9 2020 , Cyber Security
Businesses across the globe have typically taken an immature approach to cybersecurity, believing that a firewall is an adequate fortress to defend their intellectual property.

Read more...
Improved resilience and simplicity
Issue 9 2020 , Cyber Security
Cisco helps its customers and partners to reimagine the way they work, with security innovations across its portfolio designed to offer greater agility, simplicity and resilience.

Read more...
Internet of threats
Issue 9 2020 , Cyber Security
Internet-connected devices can make us more efficient, save time and money, and allow us connectivity from almost anywhere, but they also require that we share more information than ever.

Read more...
New privacy protocol
Issue 9 2020 , Cyber Security
The @ Company is creating a more human-centric Internet built on people owning and controlling their personal data.

Read more...
Behaviour is the key
Issue 9 2020, J2 Software , Cyber Security
When it comes to behaviour, visibility into human and system behaviour is key to spotting problems before they turn nasty.

Read more...
Securing the public sector
Issue 9 2020 , Cyber Security
The public sector is under threat, facing multiple attacks from multiple vectors that threaten security and systems.

Read more...
Mitigating the human risk in cybersecurity
Issue 9 2020, Technews Publishing , Cyber Security
Technology can only do so much. Humans are still the biggest cyber risk, putting organisations in jeopardy through careless or even malicious actions.

Read more...
Cyber Talent: It is more about Talent than Cyber
Issue 7 2020 , Cyber Security
Four million trained workers are needed to fully bridge the skills gap in the cybersecurity field around the world and properly defend organisations against threat actors.

Read more...