The latest in electronic signature technology

November 2011 Cyber Security

Electronic signature capture is a technology for signing electronic document files with a handwritten signature. As businesses continue to replace paper documents, contracts, and forms with more efficient and cost-effective electronic substitutes, electronic signature technology becomes an increasingly important investment.

Companies must carefully research available electronic signature solutions and ensure they choose the correct one for their business needs – guaranteeing return on investment and cost, and time savings.

The Omega LCD signature pad is a signature capture device. The device is small and compact, and its appealing design is already setting trends at POS stations. More importantly for forensic audit purposes, the Omega captures data of the highest quality, which automatically results in an electronic signature acceptable in terms of the ECT Act (Electronic Communications and Transactions Act)

Developed and designed by signotec GmbH, and supported locally by Brand New Technologies, the slim signature pad offers a flat surface without restricting edges between the sensor and the housing, making for ultra-ergonomic signing. The pen and sensor convey a feeling similar to writing on paper, and the rounded sides allow the heel of the hand to transition smoothly from signature tablet to table without disrupting the signing process.

Additional functionality includes:

* At a sampling rate of 500 samples per second, directional, speed, and pressure coordinates from the signature can be digitised and recorded at an unsurpassed frequency.

* Data transmission from pad to PC is secured, preventing biometric characteristics from being intercepted.

* A special sensor with robust surface allowing signatures to be accurately captured for many years.

* Display resolution of 640 x 480 pixels providing outstanding display of graphics and text.

* Scrolling functionality for graphics.

* Two adjustable lights indicating the device status to the user.

* Ten freely programmable memory spaces on the pad for storing recurring content, offering a speed benefit for the graphics layout as these are not repeatedly loaded onto the pad but instead simply retrieved.

* Internal storage can also be used for slide shows, running independently, without connection to the software.

* Customisation of the external case, including customised colours and client logos.

* Free software suite with the signoPAD-API, signoIntegrator, signoImager and a MS Office add-in.

For more information contact Brand New Technologies, +27 (0)11 450 3088, danica@bntech.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Patient critical – healthcare’s cybersecurity pulse
August 2019, Wolfpack Information Risk , News, Cyber Security, Healthcare (Industry)
The healthcare industry has become one of the leading cybersecurity attack vectors worldwide for several reasons.

Read more...
Building a Human Firewall
August 2019, Kaspersky Lab , Cyber Security, Training & Education
Riaan Badenhorst, general manager of Kaspersky in Africa answers some questions on the role of people in cybersecurity risks.

Read more...
Inundated with cyberattacks from all directions
August 2019 , Editor's Choice, Cyber Security, Security Services & Risk Management
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up-to-date technology.

Read more...
Under cyberattack
August 2019, Kaspersky Lab , Cyber Security, Residential Estate (Industry)
Cybersecurity is not something one usually associates with residential estates, but the threats from cybercriminals apply equally to estates as they do to businesses and the individual homeowner.

Read more...
Cyber tools and solutions
August 2019, Technews Publishing , Editor's Choice, Cyber Security, IT infrastructure, Residential Estate (Industry)
Hi-Tech Security Solutions looks at the various options we have when it comes to protecting yourself from the ever-growing scourge of cybercrime?

Read more...
Understanding the data protection requirements and how to comply for POPI or GDPR
July 2019 , Cyber Security, Security Services & Risk Management
For many companies that must comply with these legislations, the best way to prepare is to implement a solid data protection strategy that guards against loss of data.

Read more...
Going safely into the brave new world of 4IR
July 2019 , Industrial (Industry), Cyber Security
Put cybersecurity at the heart of industrial digitisation on the journey to 4IR.

Read more...
It’s not wise to go SIEMless
August 2019 , Cyber Security, Security Services & Risk Management
As with every other aspect of security today, information security, while the popular child in a dysfunctional family, is no longer enough.

Read more...
A one-size-fits-all approach won’t secure the IoT
August 2019 , News, Cyber Security
Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach, and every kind of connected object must be assessed individually.

Read more...
Cloud advantage or cost?
August 2019 , Cyber Security, IT infrastructure
No matter how you look at it, security in the cloud is as important as security in traditional data centres.

Read more...