The eSignature Comes of Age

In recent years, the use of digital or electronic signatures has rapidly increased in an effort to streamline all types of business transactions. The eSignature can not only be used as an actual certifiable signature, just as we did with a pen, but can also be used to encrypt the contents of a document, thus making it accessible only to those whom the owner of the eSignature has granted permission. Furthermore, the protected document can be additionally controlled to ensure that the content cannot be changed.

There are two types of electronic signatures: those based on Public Key Infrastructure (PKI) and those that are not. Digital signatures that do not use PKI cannot: offer a unique signature for each user; identify the signer (authentication); detect changes in the documentation after signing (non-repudiation); or offer a guarantee of sole control for the signer (non-repudiation).

Read the full article on page 20

LegalEx Firm Security of The Year Award 2017
Encryption as the Cornerstone of Big Data Security