SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Think twice before you
sign again!
Are Digital or Electronic Signatures in your future?
Agenda for today
 Develop a deeper understanding of the two technologies and how they differ?
 Is On Prem or SaaS the best model for my organization?
 There is a clear return on investment by adopting digital and/or electronic
signatures. Attend the webinar and we'll send you white papers and ROI tools.
 Where in my organization can I use this type of solution and improve business
processes?
 See live demos of both technologies and ask questions.
Digital Signatures Demystified:
defined, defensible, & deployable
Document Integrity
Confirmed
Document Tamper
Detected
Realty is…
An Electronic signature could be nothing more
 than your name on an email
 An image of your traditional signature
 A biometric signature
 Application based digital signature
 PKI based digital signature
What is a Digital Signatures?
Digital Signatures are the most secure, most advanced form of an
electronic signature.
What is an Electronic Signature?
Electronic signature can be something as simple as
“check this box” to accept/approve like we see on the
internet, it can also be an image/copy of someone’s
signature applied to a document.
Evidence: Authenticates a writing by identifying the signer with the
signed document. When the signer makes a mark in a distinctive
manner, the writing becomes attributable to the signer.
Ceremony: The act of signing calls to the signer's attention the legal
significance of the signer's act, and thereby helps prevent
"inconsiderate engagements”.
Approval: In certain contexts defined by law or custom, a signature
expresses the signer's approval or authorization of the writing, or the
signer's intention that it have legal effect.
Efficiency and logistics: A signature on a written document often
imparts a sense of clarity and finality to the transaction and may lessen
the subsequent need to inquire beyond the face of a document.
Deterrence: To discourage transactions of doubtful utility.
What A Signature Accomplishes
Security – The signer is the only one who could have signed
Integrity – What was signed has not been altered between
point A and B
Non Repudiation – Connects a signer in a way that prevents
denying the agreement
Authenticity – the signature can be authorized by a secure
process
Enforceability – the signatures must be verifiable by relying
parties
What Must Be Achieved
Is it legal in Canada?
Uniform Electronic Commerce Act
• Electronic Signature: "information in electronic form that a person,
directly or through an agent, associates with an electronic document
for the purpose of establishing a connection between the electronic
document and the person.“
• Effect of Electronic Signature
"A requirement under [enacting jurisdiction] law for the signature of a
person is satisfied by an electronic signature if:
(a) the electronic signature is reliable for the purpose of identifying the
person, in the light of all the circumstances, including any relevant
agreement and the time the electronic signature was made; and
(b) the association of the electronic signature to the relevant electronic
document is reliable for the purpose for which the electronic document
was made, in the light of all the circumstances, including any relevant
agreement and the time the electronic signature was made."
Canada Evidence Act
2000 Amendment on Authentication of Electronic Documents
• 31.1 Any person seeking to admit an electronic document as evidence has
the burden of proving its authenticity by evidence capable of supporting a
finding that the electronic document is that which it is purported to be.
• 31.3 The integrity of an electronic documents system is proven:
a) by evidence that the computer system was operating properly;
b) if the electronic document was recorded or stored by a party who is
adverse in interest to the party seeking to introduce it; or
c) if the electronic document was recorded or stored in the usual and
ordinary course of business by a person who is not a party and who
did not record or store it under the control of the party seeking to
introduce it.
Electronic Records as Documentary Evidence
Canadian General Standards Board - CAN/CGSB-72.34-2005
• Owner of e-record needs to prove the reliability of the system used to
create/maintain the record
• Reliability is shown by demonstrating use of system in normal course of
Business
• Compliance with the standard is not mandatory.
• Compliance with the standard is a safe harbour, not a guarantee of any
legal result.
• The standard is a statement of best practices.
Best Practices
E-Signature
• Is adopted by Clear process for capture of intent and can be attributed to signer
• Is linked to signed record
E-Record
• Single, reliable business record with evidence of signature
• Accurate presentation and review of documents
• WYSWYS – link between review and signatures
• Electronic records can be accurately reproduced at later dates
• Available and accessible to all parties
E-Transaction
• Controlled process ensures compliance with laws, regulations
• Creates secure audit trails of entire process
• Electronic evidence can be easily reproduced or played back
Digital Signatures Demystified:
defined, defensible, & deployable
The vendor landscape
Forrester Wave™: E-Signature, Q3 ’12
Here’s why you want signatures
We do know paper is too expensive!
Before
Source: AIIM 2013 Survey
After
What documents attract a signature
But is cost our only concern?
 Security
 Compliance
 Speed
 Productivity
 ROI
Did you ever ROI pens, paper, file cabinets?
What other concerns are there?
Source: AIIM 2013 Survey
Pricing
 On Premise
 Hardware
 Software
 Deployment
 Integration (ECM and Back office)
 training
 Cloud/saas
 No hardware
 Software web based
 Deployment
 Integration
 training
Pricing Model
TIME
COST
Cloud
On
Premise
Pricing assumption model
On prem - 100 users
 $33,000.00 1st year
 Yr. 2 costs - $5000.00
Cloud – 100 users
 $24,000.00 1st year and
subsequent years
 Yr. 2 costs $24,000.00
Despite the business benefits reported by existing users, digital signature projects are
not given a high priority within IT departments.
Elsewhere in the business, non-familiarity with the technology and a reluctance to
change time-honored ways of working are given as barriers to adoption.
Convenience and simplicity of both use and administration are obvious factors here.
We have seen that those intending to purchase a digital signature system are also
looking for it to be easily integrated into their ECM system.
Source: AIIM 2013 Survey
Solutions we’ll demo today
What’s in the CoSign System?
 Signature pad
 2 blue MiniKeys (backup), 1 red MiniKey
(license)
 Serial Cable (RS-232A) and a USB-to-Serial
adapter
 Installation CD
 Documentation, MSIs
 CoSign Central Enterprise appliance
Any signature is based on trust in the signor's
identity and the process by which it is invoked
The process must have a policy behind it
Trust is not inherent in any technology
Technology must be used in a trustworthy manner
in order to establish trusted systems
Even a system that is being used in a trustworthy
manner is ineffective if we cannot prove its
reliability
Future transactions that cannot be fully reduced to
paper
In the End- Keep In Mind!
About Process Fusion Inc.
Thank you for attending
 For more information:
 bmartin@processfusion.ca
 or 905-813-5547

Weitere ähnliche Inhalte

Was ist angesagt?

Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-SigningNamirial GmbH
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
xyzmo 4 Insurance White Paper 2pages
xyzmo 4 Insurance White Paper 2pagesxyzmo 4 Insurance White Paper 2pages
xyzmo 4 Insurance White Paper 2pagesNamirial GmbH
 
xyzmo 4 Insurance White Paper
xyzmo 4 Insurance White Paperxyzmo 4 Insurance White Paper
xyzmo 4 Insurance White PaperNamirial GmbH
 
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.iFour Technolab Pvt. Ltd.
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionFarhan Farrukh
 
ACH Processing in TOPS [ONE]
ACH Processing in TOPS [ONE]ACH Processing in TOPS [ONE]
ACH Processing in TOPS [ONE]TOPS Software
 
Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Ian Beckett
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseVisual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseDeloitte Forensic Center
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 

Was ist angesagt? (20)

Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-Signing
 
Cyber
CyberCyber
Cyber
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
xyzmo 4 Insurance White Paper 2pages
xyzmo 4 Insurance White Paper 2pagesxyzmo 4 Insurance White Paper 2pages
xyzmo 4 Insurance White Paper 2pages
 
xyzmo 4 Insurance White Paper
xyzmo 4 Insurance White Paperxyzmo 4 Insurance White Paper
xyzmo 4 Insurance White Paper
 
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Case in Legal Industry - iFour Technolab Pvt. Ltd.
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
 
Designing the Minimalist Law Firm
Designing the Minimalist Law Firm  Designing the Minimalist Law Firm
Designing the Minimalist Law Firm
 
ACH Processing in TOPS [ONE]
ACH Processing in TOPS [ONE]ACH Processing in TOPS [ONE]
ACH Processing in TOPS [ONE]
 
Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?Blockchain Technology A game-changer in accounting ?
Blockchain Technology A game-changer in accounting ?
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Class it act
Class it actClass it act
Class it act
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseVisual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 

Ähnlich wie Think twice before you sign again!

The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceNiranjanaDhumal
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
Ariba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesAriba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesSAP Ariba
 
Digital Signatures, Your Most Successful SharePoint Project
Digital Signatures, Your Most Successful SharePoint ProjectDigital Signatures, Your Most Successful SharePoint Project
Digital Signatures, Your Most Successful SharePoint ProjectCoSign by ARX
 
Digital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDigital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDrysign By Exela
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
The Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraThe Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraDrysign By Exela
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 

Ähnlich wie Think twice before you sign again! (20)

Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Ariba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesAriba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignatures
 
Digital Signatures, Your Most Successful SharePoint Project
Digital Signatures, Your Most Successful SharePoint ProjectDigital Signatures, Your Most Successful SharePoint Project
Digital Signatures, Your Most Successful SharePoint Project
 
Digital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDigital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by Exela
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Gift_of_Time_NSW
Gift_of_Time_NSWGift_of_Time_NSW
Gift_of_Time_NSW
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
The Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraThe Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital Era
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Think twice before you sign again!

  • 1. Think twice before you sign again! Are Digital or Electronic Signatures in your future?
  • 2. Agenda for today  Develop a deeper understanding of the two technologies and how they differ?  Is On Prem or SaaS the best model for my organization?  There is a clear return on investment by adopting digital and/or electronic signatures. Attend the webinar and we'll send you white papers and ROI tools.  Where in my organization can I use this type of solution and improve business processes?  See live demos of both technologies and ask questions.
  • 3. Digital Signatures Demystified: defined, defensible, & deployable Document Integrity Confirmed Document Tamper Detected
  • 4. Realty is… An Electronic signature could be nothing more  than your name on an email  An image of your traditional signature  A biometric signature  Application based digital signature  PKI based digital signature
  • 5. What is a Digital Signatures? Digital Signatures are the most secure, most advanced form of an electronic signature. What is an Electronic Signature? Electronic signature can be something as simple as “check this box” to accept/approve like we see on the internet, it can also be an image/copy of someone’s signature applied to a document.
  • 6. Evidence: Authenticates a writing by identifying the signer with the signed document. When the signer makes a mark in a distinctive manner, the writing becomes attributable to the signer. Ceremony: The act of signing calls to the signer's attention the legal significance of the signer's act, and thereby helps prevent "inconsiderate engagements”. Approval: In certain contexts defined by law or custom, a signature expresses the signer's approval or authorization of the writing, or the signer's intention that it have legal effect. Efficiency and logistics: A signature on a written document often imparts a sense of clarity and finality to the transaction and may lessen the subsequent need to inquire beyond the face of a document. Deterrence: To discourage transactions of doubtful utility. What A Signature Accomplishes
  • 7. Security – The signer is the only one who could have signed Integrity – What was signed has not been altered between point A and B Non Repudiation – Connects a signer in a way that prevents denying the agreement Authenticity – the signature can be authorized by a secure process Enforceability – the signatures must be verifiable by relying parties What Must Be Achieved
  • 8.
  • 9. Is it legal in Canada?
  • 10.
  • 11. Uniform Electronic Commerce Act • Electronic Signature: "information in electronic form that a person, directly or through an agent, associates with an electronic document for the purpose of establishing a connection between the electronic document and the person.“ • Effect of Electronic Signature "A requirement under [enacting jurisdiction] law for the signature of a person is satisfied by an electronic signature if: (a) the electronic signature is reliable for the purpose of identifying the person, in the light of all the circumstances, including any relevant agreement and the time the electronic signature was made; and (b) the association of the electronic signature to the relevant electronic document is reliable for the purpose for which the electronic document was made, in the light of all the circumstances, including any relevant agreement and the time the electronic signature was made."
  • 12. Canada Evidence Act 2000 Amendment on Authentication of Electronic Documents • 31.1 Any person seeking to admit an electronic document as evidence has the burden of proving its authenticity by evidence capable of supporting a finding that the electronic document is that which it is purported to be. • 31.3 The integrity of an electronic documents system is proven: a) by evidence that the computer system was operating properly; b) if the electronic document was recorded or stored by a party who is adverse in interest to the party seeking to introduce it; or c) if the electronic document was recorded or stored in the usual and ordinary course of business by a person who is not a party and who did not record or store it under the control of the party seeking to introduce it.
  • 13. Electronic Records as Documentary Evidence Canadian General Standards Board - CAN/CGSB-72.34-2005 • Owner of e-record needs to prove the reliability of the system used to create/maintain the record • Reliability is shown by demonstrating use of system in normal course of Business • Compliance with the standard is not mandatory. • Compliance with the standard is a safe harbour, not a guarantee of any legal result. • The standard is a statement of best practices.
  • 14. Best Practices E-Signature • Is adopted by Clear process for capture of intent and can be attributed to signer • Is linked to signed record E-Record • Single, reliable business record with evidence of signature • Accurate presentation and review of documents • WYSWYS – link between review and signatures • Electronic records can be accurately reproduced at later dates • Available and accessible to all parties E-Transaction • Controlled process ensures compliance with laws, regulations • Creates secure audit trails of entire process • Electronic evidence can be easily reproduced or played back
  • 15. Digital Signatures Demystified: defined, defensible, & deployable
  • 16. The vendor landscape Forrester Wave™: E-Signature, Q3 ’12
  • 17. Here’s why you want signatures
  • 18.
  • 19.
  • 20. We do know paper is too expensive!
  • 22. Source: AIIM 2013 Survey After
  • 23. What documents attract a signature
  • 24. But is cost our only concern?  Security  Compliance  Speed  Productivity  ROI Did you ever ROI pens, paper, file cabinets?
  • 25. What other concerns are there? Source: AIIM 2013 Survey
  • 26. Pricing  On Premise  Hardware  Software  Deployment  Integration (ECM and Back office)  training  Cloud/saas  No hardware  Software web based  Deployment  Integration  training
  • 28. Pricing assumption model On prem - 100 users  $33,000.00 1st year  Yr. 2 costs - $5000.00 Cloud – 100 users  $24,000.00 1st year and subsequent years  Yr. 2 costs $24,000.00
  • 29. Despite the business benefits reported by existing users, digital signature projects are not given a high priority within IT departments. Elsewhere in the business, non-familiarity with the technology and a reluctance to change time-honored ways of working are given as barriers to adoption. Convenience and simplicity of both use and administration are obvious factors here. We have seen that those intending to purchase a digital signature system are also looking for it to be easily integrated into their ECM system. Source: AIIM 2013 Survey
  • 31.
  • 32.
  • 33. What’s in the CoSign System?  Signature pad  2 blue MiniKeys (backup), 1 red MiniKey (license)  Serial Cable (RS-232A) and a USB-to-Serial adapter  Installation CD  Documentation, MSIs  CoSign Central Enterprise appliance
  • 34. Any signature is based on trust in the signor's identity and the process by which it is invoked The process must have a policy behind it Trust is not inherent in any technology Technology must be used in a trustworthy manner in order to establish trusted systems Even a system that is being used in a trustworthy manner is ineffective if we cannot prove its reliability Future transactions that cannot be fully reduced to paper In the End- Keep In Mind!
  • 36. Thank you for attending  For more information:  bmartin@processfusion.ca  or 905-813-5547