Are Electronic Signatures Safe?

Yes, electronic signatures are safe, and in this post, we’ll cover why an e-signature is more secure than a wet signature, how e-signatures work and the features that help keep them safe.

Why an e-signature is more secure than a wet signature

A common question people have is “Can my digital signature be forged, misused or copied?”

The reality is, wet signatures can easily be forged and tampered with. An electronic signature has many layers of security and authentication built in, along with court-admissible proof of transaction. An electronic signature helps you avoid tampering and impersonation in digital communications because it is unique to you.

Electronic record

Unlike wet signatures, e-signature providers may offer an electronic record that serves as an audit trail and proof of the transaction. For example, the audit trail may include the history of signature-related actions taken with the document, such as details on when it was opened, viewed and signed. Depending on the provider, and if the signer agreed to allow access to their location, the record will also show the geo-location where it was electronically signed. If one of the signers disputes their e-signature, or if there’s any question about the transaction, this audit trail is available to all participants in the transaction and can resolve such objections.

Certificates of completion

More detailed certificates of completion can include specific details about each signer on the document, such as the consumer disclosure indicating the signer agreed to use e-signature, the e-signature image, key event timestamps and the signer's IP address and other identifying information.

Tamper-evident seal

Once the signing process is complete, some providers may digitally seal the documents using Public Key Infrastructure (PKI), an industry-standard encryption management technology. This seal indicates the electronic signature is valid and that the document hasn’t been tampered with or altered since the date of signing.

How electronic signatures work

The exact signing process varies depending on the e-signature provider that you use, but the underlying workflows of more robust solutions are similar.

Sending a document for e-signature:

  • Upload the document you need signed, such as a Word document or a PDF file
  • Tag the sections that require initials, signatures, phone numbers, etc.
  • Select the methods of signer authentication you want to use
  • Send the file via the service to your designated recipient’s email

Signing a document:

  • Receive an email notification to review and sign a document
  • Verify your identity before signing (if the sender requires that option)
  • Read the disclosure documents and agree to use the electronic process
  • Review the document and complete any necessary fields, including attaching any required documents
  • Sign the document by clicking the signature button or applying an e-signature mark

Once all recipients have signed a document, they’re notified, and the document is stored electronically where it can be viewed and downloaded. All of this is done safely due to the built-in security features and the processes that e-signature providers follow.

Methods of verifying signer identity

E-signature technology offers multiple options for verifying a signer’s identity before they can access the document and sign, including:

  • Email address: signers enter their own email address, which is compared to the email address used in the invitation
  • SMS: signers must enter a one-time passcode sent via SMS text message
  • Knowledge-based authentication (KBA): signers are asked personal questions gathered from commercially available databases, such as past addresses or vehicles owned
  • Photo ID upload: signers are verified using their government-issued photo IDs such as passport, driver license or residence permit
  • Electronic or bank based IDs: signers can submit their login credentials for existing bank accounts or government accounts to prove their identity

For situations where additional levels of signature validity are necessary, some providers offer two additional levels of e-signature that comply with the European Union’s (EU) eIDAS requirements:

  • Advanced: requires a higher level of security, identity verification and authentication to establish a link to the signatory; and includes a certificate-based digital ID (X.509 PKI) issued by a trusted service provider
  • Qualified: an even more secure version of an advanced e-signature that utilizes a “secure signature creation device” and is deemed a legal equivalent to a wet signature in the EU

The importance of a security-first approach to e-signatures

The level of e-signature security varies by provider, so it’s important to choose a provider that has robust security and protection weaved into every area of their business. Those security measures should include:

  • Physical security: protects the systems and buildings where the systems reside
  • Platform security: safeguards the data and processes that are stored in the systems
  • Security certifications/processes: help ensure the provider’s employees and partners follow security and privacy best practices

Physical security

  • Geo-dispersed data centers with active and redundant systems and physical and logically separated networks
  • Commercial-grade firewalls and border routers to detect IP-based and denial-of -service attacks
  • Malware protection
  • Secure, near real-time data replication
  • Around-the-clock onsite security
  • Strict physical access control with monitored video surveillance

Platform security

  • Data encryption in transit and at rest with TLS connections and AES 256-bit encryption
  • Data access and transfer via HTTPS
  • Use of Security Assertion Markup Language (SAML), giving users the latest capabilities for Web-based authentication and authorization
  • PKI tamper-evident seal
  • Certificate of completion
  • Signature verification and unalterable capture of signing actions and completion status
  • Multiple authentication options for signers

Security certifications/processes

  • Compliance with applicable laws, regulations and industry standards, governing digital transactions and electronic signatures, including:
  • Ability to help support compliance obligations with specialized industry regulations, such as HIPAA, 21 CFR Part 11 and specified rules from the FTC, FHA, IRS and FINRA
  • Security management processes and development practices, including business continuity and disaster recovery planning, employee training, secure coding practices, formal code reviews and regular, code-base security audits

So, to answer the question, are electronic signatures safe? Yes, electronic signatures are indeed safe, and Docusign maintains a security-first approach to ensuring the validity of e-signatures through enhanced signer identity verification, multiple layers of physical and platform security, and a robust compliance certification program.

For more information on what to look for in an e-signature provider, read our recent blog Choosing the Right E-Signature Solution Is Critical When It Comes to Enforcing Agreements.

For more information on the safety and security of Docusign eSignature specifically, visit the Docusign Trust Center.

Yasamin Yousefi
E-Signature Expert