Signing On The Dotted Cloud

Signing On The Dotted Cloud

Signing on the Dotted Cloud

One area where the virtual world of the cloud leads to a sense of discomfort has to do with signing documents and contracts. For centuries, the binding value of an agreement was based on an individual’s capacity to sign his or her name at the bottom – a visual and permanent testament to a person’s consent to the terms of the agreement. Prior to the age of the fax machine, these documents were signed and then transported by courier or mail, but this changed once it became possible to enforce contracts based on a document’s own digital facsimile.

Today, in a world where almost everything is accessible instantly via the cloud, the act of physically printing a document in order to sign it, scan it and fax it back seems dated and time-consuming, and to that end a number of online solutions have appeared that allow individuals to append a graphic signature to an electronic document such as a PDF or Microsoft Word file.

Currently the most widely-used online signing tools include Echosign by Adobe Systems, DocuSign, SignNow and HelloSign, although there are many others. In all of these cases, the recipient of a document is prompted to place a signature, initial or date at specific locations on a page, and then save and re-send. It’s as simple as that. The signature itself is formed from either a selection of cursive-style fonts from which the signer can choose, a space for the signer to physically scrawl their autograph, or the option to upload a previously-saved image of their own signature.

Naturally the initial resistance that many organizations feel when confronted with this technique has to do with security and legitimacy. After all, how can it be proven that a signature delivered electronically is real?

agreement-documentEach of the major online signing companies explain very clearly on their websites just how security is maintained. First they make mention of their adherence to national and international signing laws such as the Uniform Electronic Transactions Act (UETA) established in 1999, The Electronic Signatures in Global and National Commerce Act (ESIGN) enacted by the U.S. Congress in 2000, and the Canadian privacy law, PIPEDA. These international laws established standards for the legitimacy and legal enforceability of electronic signatures. Furthermore, some of these providers will demonstrate compliance with the information security management system (ISMS) standard ISO27001.

Next, they highlight the actual security features that accompany every single document. An electronic signature represents more than simply a visual graphic; it includes encryption to ensure that the sender is indeed the sender, and backs this up with an extensive digital paper trail and audit process.

And finally the provider takes care to demonstrate the types of clients who have already embraced and benefited from electronic signing, from airlines, engineering and insurance companies through to law firms and even professional athletes, signing multi-million dollar contracts.

As with all things computer-related, the decision to embrace online signing should be made after sufficient research and testing to ensure the the chosen technology is physically useable and acceptable by both internal staff and external clients and suppliers. Decision-makers should be able to understand the difference between an electronic signature, as provided by online document signing suppliers, and a digital signature, which is a certificate-based user ID often used for access to databases or in smart cards. For contracts and other paperwork that requires agreements between people, the electronic signature is sufficient, legal and enforceable.

With the cloud becoming the centrepiece of business, and with the adoption of mobile devices and BYOD as standard practice, the concept of keeping crucial documents in a centrally accessible, secure and auditable zone makes more sense than ever before. As with many innovations before it, its relative novelty and the very human sense of fear and mistrust that accompanies change will spur decision-makers to do their homework before embracing this technology, and in so doing will help ensure its safe and practical relevance.

The bottom line – literally in this case – is that signatures made online can actually be more secure than any action short of signing in person in front of witnesses. It actually offers a greater degree of safety than a faxed document, and one need only think of the numerous times people leave their signatures lying around, such as when signing credit card slips, signing for courier deliveries, or forgetting original documents at the photocopier, to realize the types of dangers that online signing actually removes from today’s high-speed business world.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…