Signing On The Dotted Cloud

Signing On The Dotted Cloud

Signing on the Dotted Cloud

One area where the virtual world of the cloud leads to a sense of discomfort has to do with signing documents and contracts. For centuries, the binding value of an agreement was based on an individual’s capacity to sign his or her name at the bottom – a visual and permanent testament to a person’s consent to the terms of the agreement. Prior to the age of the fax machine, these documents were signed and then transported by courier or mail, but this changed once it became possible to enforce contracts based on a document’s own digital facsimile.

Today, in a world where almost everything is accessible instantly via the cloud, the act of physically printing a document in order to sign it, scan it and fax it back seems dated and time-consuming, and to that end a number of online solutions have appeared that allow individuals to append a graphic signature to an electronic document such as a PDF or Microsoft Word file.

Currently the most widely-used online signing tools include Echosign by Adobe Systems, DocuSign, SignNow and HelloSign, although there are many others. In all of these cases, the recipient of a document is prompted to place a signature, initial or date at specific locations on a page, and then save and re-send. It’s as simple as that. The signature itself is formed from either a selection of cursive-style fonts from which the signer can choose, a space for the signer to physically scrawl their autograph, or the option to upload a previously-saved image of their own signature.

Naturally the initial resistance that many organizations feel when confronted with this technique has to do with security and legitimacy. After all, how can it be proven that a signature delivered electronically is real?

agreement-documentEach of the major online signing companies explain very clearly on their websites just how security is maintained. First they make mention of their adherence to national and international signing laws such as the Uniform Electronic Transactions Act (UETA) established in 1999, The Electronic Signatures in Global and National Commerce Act (ESIGN) enacted by the U.S. Congress in 2000, and the Canadian privacy law, PIPEDA. These international laws established standards for the legitimacy and legal enforceability of electronic signatures. Furthermore, some of these providers will demonstrate compliance with the information security management system (ISMS) standard ISO27001.

Next, they highlight the actual security features that accompany every single document. An electronic signature represents more than simply a visual graphic; it includes encryption to ensure that the sender is indeed the sender, and backs this up with an extensive digital paper trail and audit process.

And finally the provider takes care to demonstrate the types of clients who have already embraced and benefited from electronic signing, from airlines, engineering and insurance companies through to law firms and even professional athletes, signing multi-million dollar contracts.

As with all things computer-related, the decision to embrace online signing should be made after sufficient research and testing to ensure the the chosen technology is physically useable and acceptable by both internal staff and external clients and suppliers. Decision-makers should be able to understand the difference between an electronic signature, as provided by online document signing suppliers, and a digital signature, which is a certificate-based user ID often used for access to databases or in smart cards. For contracts and other paperwork that requires agreements between people, the electronic signature is sufficient, legal and enforceable.

With the cloud becoming the centrepiece of business, and with the adoption of mobile devices and BYOD as standard practice, the concept of keeping crucial documents in a centrally accessible, secure and auditable zone makes more sense than ever before. As with many innovations before it, its relative novelty and the very human sense of fear and mistrust that accompanies change will spur decision-makers to do their homework before embracing this technology, and in so doing will help ensure its safe and practical relevance.

The bottom line – literally in this case – is that signatures made online can actually be more secure than any action short of signing in person in front of witnesses. It actually offers a greater degree of safety than a faxed document, and one need only think of the numerous times people leave their signatures lying around, such as when signing credit card slips, signing for courier deliveries, or forgetting original documents at the photocopier, to realize the types of dangers that online signing actually removes from today’s high-speed business world.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

Four FinTech Trends To Look Out For

Four FinTech Trends To Look Out For

FinTech Trends The fintech industry witnessed an enormous growth in 2015. Around $7.6 billion were invested in fintech companies last year, a substantial increase from the $4.7 billion in 2014. There is no doubt that this momentum will continue this year. The growth of capital being invested in fintech companies illustrates how technology and the…

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization Server virtualization is one of the cornerstone technologies of the cloud. The ability to create multiple virtual servers that can run any operating system on a single physical server has a lot of advantages. These advantages can appear in public, Infrastructure as a Service (IaaS), as well as in private clouds. However,…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor