Electronic signature

Last updated

An electronic signature, or e-signature, is data that is logically associated with other data and which is used by the signatory to sign the associated data. [1] [2] [3] This type of signature has the same legal standing as a handwritten signature as long as it adheres to the requirements of the specific regulation under which it was created (e.g., eIDAS in the European Union, NIST-DSS in the USA or ZertES in Switzerland). [4] [5]

Contents

Electronic signatures are a legal concept distinct from digital signatures, a cryptographic mechanism often used to implement electronic signatures. While an electronic signature can be as simple as a name entered in an electronic document, digital signatures are increasingly used in e-commerce and in regulatory filings to implement electronic signatures in a cryptographically protected way. Standardization agencies like NIST or ETSI provide standards for their implementation (e.g., NIST-DSS, XAdES or PAdES). [4] [6] The concept itself is not new, with common law jurisdictions having recognized telegraph signatures as far back as the mid-19th century and faxed signatures since the 1980s.

Description

The USA's E-Sign Act, [7] [8] signed June 30, 2000 by President Clinton was described months later as "more like a seal than a signature." [9]

An electronic signature is intended to provide a secure and accurate identification method for the signatory during a transaction. Definitions of electronic signatures vary depending on the applicable jurisdiction. A common denominator in most countries is the level of an advanced electronic signature requiring that:

  1. The signatory can be uniquely identified and linked to the signature
  2. The signatory must have sole control of the private key that was used to create the electronic signature
  3. The signature must be capable of identifying if its accompanying data has been tampered with after the message was signed
  4. In the event that the accompanying data has been changed, the signature must be invalidated [10]

Electronic signatures may be created with increasing levels of security, with each having its own set of requirements and means of creation on various levels that prove the validity of the signature. To provide an even stronger probative value than the above described advanced electronic signature, some countries like member states of the European Union or Switzerland introduced the qualified electronic signature. It is difficult to challenge the authorship of a statement signed with a qualified electronic signature - the statement is non-repudiable. [11] Technically, a qualified electronic signature is implemented through an advanced electronic signature that utilizes a digital certificate, which has been encrypted through a security signature-creating device [12] and which has been authenticated by a qualified trust service provider. [13]

In contract law

Since well before the American Civil War began in 1861, morse code was used to send messages electrically via the telegraph. Some of these messages were agreements to terms that were intended as enforceable contracts. An early acceptance of the enforceability of telegraphic messages as electronic signatures came from a New Hampshire Supreme Court case, Howley v. Whipple, in 1869. [14] [15]

In the 1980s, many companies and even some individuals began using fax machines for high-priority or time-sensitive delivery of documents. Although the original signature on the original document was on paper, the image of the signature and its transmission was electronic. [16]

Courts in various jurisdictions have decided that enforceable legality of electronic signatures can include agreements made by email, entering a personal identification number (PIN) into a bank ATM, signing a credit or debit slip with a digital pen pad device (an application of graphics tablet technology) at a point of sale, installing software with a clickwrap software license agreement on the package, and signing electronic documents online.

The first agreement signed electronically by two sovereign nations was a Joint Communiqué recognizing the growing importance of the promotion of electronic commerce, signed by the United States and Ireland in 1998. [17]

Enforceability

In 1996 the United Nations published the UNCITRAL Model Law on Electronic Commerce. [18] Article 7 of the UNCITRAL Model Law on Electronic Commerce was highly influential in the development of electronic signature laws around the world, including in the US. [19] In 2001, UNCITRAL concluded work on a dedicated text, the UNCITRAL Model Law on Electronic Signatures, [20] which has been adopted in some 30 jurisdictions. [21] Article 9, paragraph 3 of the United Nations Convention on the Use of Electronic Communications in International Contracts, 2005, which establishes a mechanism for functional equivalence between electronic and handwritten signatures at the international level as well as for the cross-border recognition. The latest UNCITRAL text dealing with electronic signatures is article 16 of the UNCITRAL Model Law on the Use and Cross-border Recognition of Identity Management and Trust Services (2022).

Canadian law (PIPEDA) attempts to clarify the situation by first defining a generic electronic signature as "a signature that consists of one or more letters, characters, numbers or other symbols in digital form incorporated in, attached to or associated with an electronic document," then defining a secure electronic signature as an electronic signature with specific properties. PIPEDA's secure electronic signature regulations refine the definition as being a digital signature applied and verified in a specific manner. [22]

In the European Union, EU Regulation No 910/2014 on electronic identification and trust services for electronic transactions in the European internal market (eIDAS) sets the legal frame for electronic signatures. It repeals Directive 1999/93/EC. [2] The current and applicable version of eIDAS was published by the European Parliament and the European Council on July 23, 2014. Following Article 25 (1) of the eIDAS regulation, an advanced electronic signature shall “not be denied legal effect and admissibility as evidence in legal proceedings". However it will reach a higher probative value when enhanced to the level of a qualified electronic signature. By requiring the use of a qualified electronic signature creation device [23] and being based on a certificate that has been issued by a qualified trust service provider, the upgraded advanced signature then carries according to Article 25 (2) of the eIDAS Regulation the same legal value as a handwritten signature. [2] [10] However, this is only regulated in the European Union and similarly through ZertES in Switzerland. A qualified electronic signature is not defined in the United States. [24] [25]

The U.S. Code defines an electronic signature for the purpose of US law as "an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record." [26] It may be an electronic transmission of the document which contains the signature, as in the case of facsimile transmissions, or it may be encoded message, such as telegraphy using Morse code.

In the United States, the definition of what qualifies as an electronic signature is wide and is set out in the Uniform Electronic Transactions Act ("UETA") released by the National Conference of Commissioners on Uniform State Laws (NCCUSL) in 1999. [27] It was influenced by ABA committee white papers and the uniform law promulgated by NCCUSL. Under UETA, the term means "an electronic sound, symbol, or process, attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record." This definition and many other core concepts of UETA are echoed in the U.S. ESign Act of 2000. [26] 48 US states, the District of Columbia, and the US Virgin Islands have enacted UETA. [28] Only New York and Illinois have not enacted UETA, [28] but each of those states has adopted its own electronic signatures statute. [29] [30] [31] As of June 11, 2020, Washington State Office of CIO adopted UETA. [32]

In Australia, an electronic signature is recognised as "not necessarily the writing in of a name, but maybe any mark which identifies it as the act of the party.” [33] Under the Electronic Transactions Acts in each Federal, State and Territory jurisdiction, an electronic signature may be considered enforceable if (a) there was a method used to identify the person and to indicate that person’s intention in respect of the information communicated and the method was either: (i) as reliable as appropriate for the purpose for which the electronic communication was generated or communicated, in light of all the circumstances, including the relevant agreement; or (ii) proven in fact to have fulfilled the functions above by itself or together with further evidence and the person to whom the signature is required to be given consents to that method. [34]

Various laws have been passed internationally to facilitate commerce by using electronic records and signatures in interstate and foreign commerce. The intent is to ensure the validity and legal effect of contracts entered electronically. For instance,

PIPEDA (Canadian federal law)
(1) An electronic signature is "a signature that consists of one or more letters, characters, numbers or other symbols in digital form incorporated in, attached to or associated with an electronic document";
(2) A secure electronic signature is an electronic signature that
(a) is unique to the person making the signature;
(b) the technology or process used to make the signature is under the sole control of the person making the signature;
(c) the technology or process can be used to identify the person using the technology or process; and
(d) the electronic signature can be linked with an electronic document in such a way that it can be used to determine whether the electronic document has been changed since the electronic signature was incorporated in, attached to, or associated with the electronic document.
ESIGN Act Sec 106 (US federal law) [35]
(2) ELECTRONIC- The term 'electronic' means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.
(4) ELECTRONIC RECORD- The term 'electronic record' means a contract or other record created, generated, sent, communicated, received, or stored by electronic means.
(5) ELECTRONIC SIGNATURE- The term 'electronic signature' means an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.
Regulation No 910/2014 on electronic identification and trust services for electronic transactions in the internal market Art 3 (European Union regulation)
(10) ‘electronic signature’ means data in electronic form which is attached to or logically associated with other data in electronic form and which is used by the signatory to sign;
(11) ‘advanced electronic signature’ means an electronic signature which meets the requirements set out in Article 26;
(12) ‘qualified electronic signature’ means an advanced electronic signature that is created by a qualified electronic signature creation device, and which is based on a qualified certificate for electronic signatures;
GPEA Sec 1710 (US federal law)
(1) ELECTRONIC SIGNATURE.—the term "electronic signature" means a method of signing an electronic message that—
(A) identifies and authenticates a particular person as the source of the electronic message; and
(B) indicates such person's approval of the information contained in the electronic message.
UETA Sec 2 (US state law)
(5) "Electronic" means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.
(6) "Electronic agent" means a computer program or an electronic or other automated means used independently to initiate an action or respond to electronic records or performances in whole or in part, without review or action by an individual.
(7) "Electronic record" means a record created, generated, sent, communicated, received, or stored by electronic means.
(8) "Electronic signature" means an electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.
Federal Reserve 12 CFR 202 (US federal regulation)
refers to the ESIGN Act
Commodity Futures Trading Commission 17 CFR Part 1 Sec. 1.3 (US federal regulations)
(tt) Electronic signature means an electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.
Food and Drug Administration 21 CFR Sec. 11.3 (US federal regulations)
(5) Digital signature means an electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the signer's identity and the integrity of the data can be verified.
(7) Electronic signature means a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual's handwritten signature.
United States Patent and Trademark Office 37 CFR Sec. 1.4 (federal regulation)
(d)(2) S-signature. An S-signature is a signature inserted between forwarding slash marks, but not a handwritten signature ... (i)The S-signature must consist only of letters, or Arabic numerals, or both, with appropriate spaces and commas, periods, apostrophes, or hyphens for punctuation... (e.g., /Dr. James T. Jones, Jr./)...
(iii) The signer's name must be:
(A) Presented in printed or typed form preferably immediately below or adjacent to the S-signature, and
(B) Reasonably specific enough so that the identity of the signer can be readily recognized. [36]

Laws regarding their use

Usage

In 2016, Aberdeen Strategy and Research reported that 73% of "best-in-class" and 34% of all other respondents surveyed made use of electronic signature processes in supply chain and procurement, delivering benefits in the speed and efficiency of key procurement activities. The percentages of their survey respondents using electronic signatures in accounts payable and accounts receivable processes were a little lower, 53% of "best-in-class" respondents in each case. [40]

Technological implementations (underlying technology)

Digital signature

A diagram showing how a digital signature is applied and then verified Digital Signature diagram.svg
A diagram showing how a digital signature is applied and then verified

Digital signatures are cryptographic implementations of electronic signatures used as a proof of authenticity, data integrity and non-repudiation of communications conducted over the Internet. When implemented in compliance to digital signature standards, digital signing should offer end-to-end privacy with the signing process being user-friendly and secure. Digital signatures are generated and verified through standardized frameworks such as the Digital Signature Algorithm (DSA) [6] [41] by NIST or in compliance to the XAdES, PAdES or CAdES standards, specified by the ETSI. [42]

There are typically three algorithms involved with the digital signature process:

The process of digital signing requires that its accompanying public key can then authenticate the signature generated by both the fixed message and private key. Using these cryptographic algorithms, the user's signature cannot be replicated without having access to their private key. [43] A secure channel is not typically required. By applying asymmetric cryptography methods, the digital signature process prevents several common attacks where the attacker attempts to gain access through the following attack methods. [1]

The most relevant standards on digital signatures with respect to size of domestic markets are the Digital Signature Standard (DSS) [41] by the National Institute of Standards and Technology (NIST) and the eIDAS Regulation [2] enacted by the European Parliament. [4] OpenPGP is a non-proprietary protocol for email encryption through public key cryptography. It is supported by PGP and GnuPG, and some of the S/MIME IETF standards and has evolved into the most popular email encryption standard in the world. [44]

Biometric signature

An electronic signature may also refer to electronic forms of processing or verifying identity through the use of biometric "signatures" or biologically identifying qualities of an individual. Such signatures use the approach of attaching some biometric measurement to a document as evidence. Biometric signatures include fingerprints, hand geometry (finger lengths and palm size), iris patterns, voice characteristics, retinal patterns, or any other human body property. All of these are collected using electronic sensors of some kind.

Biometric measurements of this type are useless as passwords because they can't be changed if compromised. However, they might be serviceable, except that to date, they have been so easily deceived that they can carry little assurance that the person who purportedly signed a document was actually the person who did. For example, a replay of the electronic signal produced and submitted to the computer system responsible for 'affixing' a signature to a document can be collected via wiretapping techniques.[ citation needed ] Many commercially available fingerprint sensors have low resolution and can be deceived with inexpensive household items (for example, gummy bear candy gel). [45] In the case of a user's face image, researchers in Vietnam successfully demonstrated in late 2017 how a specially crafted mask could beat Apple's Face ID on iPhone X. [46]

See also

Related Research Articles

<span class="mw-page-title-main">Digital signature</span> Mathematical scheme for verifying the authenticity of digital documents

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient.

Legal instrument is a legal term of art that is used for any formally executed written document that can be formally attributed to its author, records and formally expresses a legally enforceable act, process, or contractual duty, obligation, or right, and therefore evidences that act, process, or agreement. Examples include a certificate, deed, bond, contract, will, legislative act, notarial act, court writ or process, or any law passed by a competent legislative body in domestic or international law. Many legal instruments were written under seal by affixing a wax or paper seal to the document in evidence of its legal execution and authenticity. However, today many jurisdictions have done away with the requirement of documents being under seal in order to give them legal effect.

The Uniform Electronic Transactions Act (UETA) is one of the several United States Uniform Acts proposed by the National Conference of Commissioners on Uniform State Laws (NCCUSL). Forty-nine states, the District of Columbia, and the U.S. Virgin Islands have adopted the UETA. Its purpose is to harmonize state laws concerning retention of paper records and the validity of electronic signatures.

<span class="mw-page-title-main">Electronic Signatures in Global and National Commerce Act</span> United States federal law

The Electronic Signatures in Global and National Commerce Act is a United States federal law, passed by the U.S. Congress to facilitate the use of electronic records and electronic signatures in interstate and foreign commerce. This is done by ensuring the validity and legal effect of contracts entered into electronically; the Act was signed into law by President Bill Clinton on June 30, 2000, and took effect on October 1, 2000.

Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.

A Digital Postmark (DPM) is a technology that applies a trusted time stamp issued by a postal operator to an electronic document, validates electronic signatures, and stores and archives all non-repudiation data needed to support a potential court challenge. It guarantees the certainty of date and time of the postmarking. This global standard was renamed the Electronic Postal Certification Mark (EPCM) in 2007 shortly after a new iteration of the technology was developed by Microsoft and Poste Italiane. The key addition to the traditional postmarking technology was integrity of the electronically postmarked item, meaning any kind of falsification and tampering will be easily and definitely detected.

XAdES is a set of extensions to XML-DSig recommendation making it suitable for advanced electronic signatures. W3C and ETSI maintain and update XAdES together.

Worldwide, legislation concerning the effect and validity of electronic signatures, including, but not limited to, cryptographic digital signatures, includes:

CAdES is a set of extensions to Cryptographic Message Syntax (CMS) signed data making it suitable for advanced electronic signatures.

PAdES is a set of restrictions and extensions to PDF and ISO 32000-1 making it suitable for advanced electronic signatures (AdES). This is published by ETSI as EN 319 142.

ARX is a digital security company headquartered in San Francisco, CA, with offices in the UK, the Netherlands, Australia and Israel. It is the creator of ARX CoSign, a digital signature technology, along with related digital signature security technology products. ARX was acquired by DocuSign in May 2015. The acquisition builds on a three-year business partnership between DocuSign and ARX, bringing together ARX's CoSign digital signature technology with DocuSign's Digital Transaction Management (DTM) platform and broadens The DocuSign Global Trust Network.

eIDAS EU electronic identification regulation

eIDAS is an EU regulation with the stated purpose of governing "electronic identification and trust services for electronic transactions". It passed in 2014 and its provisions came into effect between 2016 and 2018.

An advanced electronic signature is an electronic signature that has met the requirements set forth under EU Regulation No 910/2014 (eIDAS-regulation) on electronic identification and trust services for electronic transactions in the European Single Market.

ZertES is a Swiss Federal law that regulates the conditions under which trust service providers may use certification services with electronic signatures. Additionally, this law provides a framework that outlines the provider’s obligations and rights as they apply to providing their certification services.

A qualified electronic signature is an electronic signature that is compliant with EU Regulation No 910/2014 for electronic transactions within the internal European market. It enables to verify the authorship of a declaration in electronic data exchange over long periods of time. Qualified electronic signatures can be considered as a digital equivalent to handwritten signatures.

A trust service provider (TSP) is a person or legal entity providing and preserving digital certificates to create and validate electronic signatures and to authenticate their signatories as well as websites in general. Trust service providers are qualified certificate authorities required in the European Union and in Switzerland in the context of regulated electronic signing procedures.

In the context of Regulation (EU) No 910/2014 (eIDAS), a qualified digital certificate is a public key certificate issued by a trust service provider which has government-issued qualifications. The certificate is designed to ensure the authenticity and data integrity of an electronic signature and its accompanying message and/or attached data.

A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put into service as a secure signature creation device, the device must meet the rigorous requirements laid out under Annex II of Regulation (EU) No 910/2014 (eIDAS), where it is referred to as a qualified (electronic) signature creation device (QSCD). Using secure signature creation devices helps in facilitating online business processes that save time and money with transactions made within the public and private sectors.

An electronic seal is a piece of data attached to an electronic document or other data, which ensures data origin and integrity. The term is used in the EU Regulation No 910/2014 for electronic transactions within the internal European market.

The UNCITRAL Model Law on Electronic Transferable Records (“MLETR”) is a uniform model law that has been adopted by the United Nations Commission on International Trade Law (UNCITRAL) in 2017. Its scope is to allow the use of transferable documents and instruments in electronic form. Transferable documents and instruments typically include bills of lading, warehouse receipts, bills of exchange, promissory notes and cheques. National law qualifies a document or instrument as transferable.

References

  1. 1 2 Turner, Dawn. "What is a Digital Signature - What It Does, How It Works". Cryptomathic. Archived from the original on February 9, 2016. Retrieved January 7, 2016.
  2. 1 2 3 4 "REGULATION (EU) No 910/2014 of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC". THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. Archived from the original on January 15, 2018. Retrieved January 7, 2016.
  3. "What Are E-Signatures? | Signable |". Archived from the original on July 31, 2017. Retrieved December 20, 2016.
  4. 1 2 3 Turner, Dawn. "Major Standards and Compliance of Digital Signatures - A World-Wide Consideration". Cryptomathic. Archived from the original on February 9, 2016. Retrieved January 7, 2016.
  5. "Federal Rules of Evidence | Federal Rules of Evidence | LII / Legal Information Institute". Law.cornell.edu. Archived from the original on November 25, 2011. Retrieved March 6, 2015.
  6. 1 2 JA, Ashiq. "Recommendations for Providing Digital Signature Services". Cryptomathic. Archived from the original on February 9, 2016. Retrieved January 7, 2016.
  7. "Electronic Signatures in Global and National Commerce Act". June 17, 2000.{{cite web}}: Missing or empty |url= (help)
  8. Lizette Alvarez; Jeri Clausing (June 17, 2000). "Electronic-Signature Bill Is Approved by the Senate". The New York Times .
  9. {{cite magazine=The Industry Standard |date=October 30, 2000 |page=116 |author=Bruce Schmier |title=Bad Signs}}
  10. 1 2 Turner, Dawn M. "Advanced Electronic Signatures for eIDAS". Cryptomathic. Archived from the original on June 30, 2016. Retrieved June 7, 2016.
  11. Turner, Dawn M. "Understanding eIDAS". Cryptomathic. Archived from the original on April 20, 2016. Retrieved June 7, 2016.
  12. Turner, Dawn M. "Qualified Electronic Signatures for eIDAS". Cryptomathic. Archived from the original on May 23, 2016. Retrieved June 7, 2016.
  13. Turner, Dawn M. "Trust Service Providers according to eIDAS". Cryptomathic. Archived from the original on July 11, 2016. Retrieved June 23, 2016.
  14. Howley v. Whipple, 48 N.H. 487, 488 (1869)
  15. Singleton, Solveig (March 17, 1999). "Privacy Issues In Federal Systems: A Constitutional Perspective". Cato Institute. Archived from the original on May 3, 2020. Retrieved March 6, 2015.
  16. "The History of Electronic Signature Laws". Isaac Bowman. March 16, 2009. Archived from the original on March 11, 2015. Retrieved March 6, 2015.
  17. "International Law In Brief". American Society of International Law. September 1998. Archived from the original on March 31, 2012.
  18. "UNCITRAL : Model Law on Electronic Commerce with Guide to Enactment 1996 with additional article 5 bis as adopted in 1998" (PDF). UNCITRAL. 1999. Archived from the original (PDF) on September 12, 2012. Retrieved March 6, 2015.
  19. Gabriel, Henry. "The New United States Uniform Electronic Transactions Act: Substantive Provisions, Drafting History and Comparison to the UNCITRAL Model Law on Electronic Commerce" (PDF). International Institute for the Unification of Private Law. Archived (PDF) from the original on September 29, 2011. Retrieved April 30, 2011.
  20. "UNCITRAL : Model Law on Electronic Signatures with Guide to Enactment 2001" (PDF). UNCITRAL. 2002. Archived from the original (PDF) on August 2, 2012. Retrieved March 6, 2015.
  21. "Status - UNCITRAL Model Law on Electronic Signatures (2001)". UNCITRAL. Archived from the original on February 22, 2014. Retrieved March 6, 2015.
  22. Archived June 5, 2011, at the Wayback Machine [ dead link ]
  23. eIDAS regulation Article 3 (12)
  24. Tuner, Dawn M. "Is the NIST Digital Signature Standard DSS legally binding?". Cryptomathic. Archived from the original on June 30, 2016. Retrieved May 12, 2016.
  25. Information Technology Laboratory National Institute of Standards and Technology. "FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (FIPS PUB 186 -4): Digital Signature Standard (DSS)" (PDF). Archived (PDF) from the original on December 27, 2016. Retrieved May 12, 2016.
  26. 1 2 "Public Law 106-229 : June 30, 2000 : Electronic Signatures in Global and National Commerce act" (PDF). Frwebgate.access.gpo.gov. Archived (PDF) from the original on May 22, 2011. Retrieved March 6, 2015.
  27. "Biddle Law Library: Library: • Penn Law". Law.upenn.edu. Archived from the original on August 14, 2014. Retrieved March 6, 2015.
  28. 1 2 Archived January 15, 2011, at the Wayback Machine
  29. Archived May 6, 2011, at the Wayback Machine
  30. "Chapter 19.34 RCW: WASHINGTON ELECTRONIC AUTHENTICATION ACT". Apps.leg.wa.gov. Archived from the original on February 28, 2015. Retrieved March 6, 2015.
  31. "5 ILCS 175/ Electronic Commerce Security Act". Ilga.gov. October 17, 2003. Archived from the original on October 26, 2011. Retrieved March 6, 2015.
  32. "Electronic Signature Guidelines". Washington State Office of the Chief Information Officer. April 1, 2016. Archived from the original on January 31, 2023. Retrieved February 6, 2023.
  33. Legal Services Board v Forster 26 VR 81 [2009] VSC 645
  34. AG. "Electronic Transactions Act 1999". www.legislation.gov.au. Archived from the original on June 3, 2021. Retrieved June 2, 2021.
  35. "Electronic Signatures in Global and National Commerce Act ("ESIGN")". Isaac Bowman. Archived from the original on March 11, 2015. Retrieved March 6, 2015.
  36. "MPEP §501". USPTO Manual of Patent Examining Procedures (MPEP). Archived from the original on February 17, 2012. Retrieved October 5, 2017.
  37. Archived September 27, 2011, at the Wayback Machine
  38. "Electronic Communications and Transactions Act 25 of 2002". South African Government. Archived from the original on November 18, 2021. Retrieved November 18, 2021.
  39. Barry, M., The Speed & Efficiency of E-Signature in Procurement Archived April 22, 2021, at the Wayback Machine , Aberdeen Strategy and Research, published 1 April 2016, accessed 22 April 2021
  40. 1 2 "FIPS PUB 186-4: Digital Signature Standard (DSS)" (PDF). National Institute of Standards and Technology. Archived (PDF) from the original on December 27, 2016. Retrieved January 7, 2016.
  41. Turner, Dawn M. "THE DIFFERENCE BETWEEN AN ELECTRONIC SIGNATURE AND A DIGITAL SIGNATURE". Cryptomathic. Archived from the original on May 8, 2016. Retrieved April 21, 2016.
  42. 1 2 Turner, Dawn. "What is a digital signature - what it does, how it work". Cryptomathic. Archived from the original on February 9, 2016. Retrieved June 7, 2016.
  43. "Welcome to The OpenPGP Alliance". OpenPGP Alliance. Archived from the original on January 11, 2016. Retrieved January 7, 2016.
  44. Matsumoto (2002). "Impact of artificial gummy fingers on fingerprint systems". Proceedings of SPIE. pp. 275–289. CiteSeerX   10.1.1.100.8172 .
  45. "Bkav's new mask beats Face ID in "twin way": Severity level raised, do not use Face ID in business transactions". News In Focus. Bkav Corporation. November 27, 2017. Archived from the original on May 8, 2018. Retrieved May 8, 2018.