Signing On The Dotted Cloud

Signing On The Dotted Cloud

Signing on the Dotted Cloud

One area where the virtual world of the cloud leads to a sense of discomfort has to do with signing documents and contracts. For centuries, the binding value of an agreement was based on an individual’s capacity to sign his or her name at the bottom – a visual and permanent testament to a person’s consent to the terms of the agreement. Prior to the age of the fax machine, these documents were signed and then transported by courier or mail, but this changed once it became possible to enforce contracts based on a document’s own digital facsimile.

Today, in a world where almost everything is accessible instantly via the cloud, the act of physically printing a document in order to sign it, scan it and fax it back seems dated and time-consuming, and to that end a number of online solutions have appeared that allow individuals to append a graphic signature to an electronic document such as a PDF or Microsoft Word file.

Currently the most widely-used online signing tools include Echosign by Adobe Systems, DocuSign, SignNow and HelloSign, although there are many others. In all of these cases, the recipient of a document is prompted to place a signature, initial or date at specific locations on a page, and then save and re-send. It’s as simple as that. The signature itself is formed from either a selection of cursive-style fonts from which the signer can choose, a space for the signer to physically scrawl their autograph, or the option to upload a previously-saved image of their own signature.

Naturally the initial resistance that many organizations feel when confronted with this technique has to do with security and legitimacy. After all, how can it be proven that a signature delivered electronically is real?

agreement-documentEach of the major online signing companies explain very clearly on their websites just how security is maintained. First they make mention of their adherence to national and international signing laws such as the Uniform Electronic Transactions Act (UETA) established in 1999, The Electronic Signatures in Global and National Commerce Act (ESIGN) enacted by the U.S. Congress in 2000, and the Canadian privacy law, PIPEDA. These international laws established standards for the legitimacy and legal enforceability of electronic signatures. Furthermore, some of these providers will demonstrate compliance with the information security management system (ISMS) standard ISO27001.

Next, they highlight the actual security features that accompany every single document. An electronic signature represents more than simply a visual graphic; it includes encryption to ensure that the sender is indeed the sender, and backs this up with an extensive digital paper trail and audit process.

And finally the provider takes care to demonstrate the types of clients who have already embraced and benefited from electronic signing, from airlines, engineering and insurance companies through to law firms and even professional athletes, signing multi-million dollar contracts.

As with all things computer-related, the decision to embrace online signing should be made after sufficient research and testing to ensure the the chosen technology is physically useable and acceptable by both internal staff and external clients and suppliers. Decision-makers should be able to understand the difference between an electronic signature, as provided by online document signing suppliers, and a digital signature, which is a certificate-based user ID often used for access to databases or in smart cards. For contracts and other paperwork that requires agreements between people, the electronic signature is sufficient, legal and enforceable.

With the cloud becoming the centrepiece of business, and with the adoption of mobile devices and BYOD as standard practice, the concept of keeping crucial documents in a centrally accessible, secure and auditable zone makes more sense than ever before. As with many innovations before it, its relative novelty and the very human sense of fear and mistrust that accompanies change will spur decision-makers to do their homework before embracing this technology, and in so doing will help ensure its safe and practical relevance.

The bottom line – literally in this case – is that signatures made online can actually be more secure than any action short of signing in person in front of witnesses. It actually offers a greater degree of safety than a faxed document, and one need only think of the numerous times people leave their signatures lying around, such as when signing credit card slips, signing for courier deliveries, or forgetting original documents at the photocopier, to realize the types of dangers that online signing actually removes from today’s high-speed business world.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…