SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
eSigning 101: What, Why, When & How • 6
A QUICK HISTORY OF eSIGNATURES
Some may think that eSignatures burst into the business world following the passing of ESIGN. But really,
the history of eSignatures goes back much farther. Below is a high-level history of eSignatures, as well as
groundbreaking laws and mandates that helped accelerate adoption:
Mid-1800s
Government officials
and businesses use
Morse code and the
telegraph to electronically
accept agreements.
1980s
Fax machines are the
most popular devices to
electronically send contracts
and other important
documents between people
and businesses.
1999
The National Conference of
Commissioners develops
the Uniform Electronic
Transactions Act (UETA). UETA
provides a legal framework
for the use of eSignatures and
records in government and
business transactions.
2000
The Electronic Signatures
in Global and National
Commerce Act (ESIGN) is
signed into federal law. The
law states that a document or
signature cannot be denied
legal effect or enforceability
because it is in electronic form.
2007
Apple releases the iPhone,
which becomes one of the
world’s most popular mobile
devices. Widespread adoption
of touchscreen devices
is increasing demand for
allowing eSigning on the go.
2010
Mobile app and payment
company Square launches,
empowering consumers to
sign for products and services
directly on mobile screens.
eSigning 101: What, Why, When & How • 6

Weitere ähnliche Inhalte

Was ist angesagt?

Week6 how has_technology_changed
Week6 how has_technology_changedWeek6 how has_technology_changed
Week6 how has_technology_changed
Keiko Igarashi
 
Technological advances in ontario real estate
Technological advances in ontario real estateTechnological advances in ontario real estate
Technological advances in ontario real estate
John Lusink
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Sheila Mable
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 

Was ist angesagt? (20)

E commerce
E commerceE commerce
E commerce
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
The greatest IoT sales slidedeck every created (2nd version)
The greatest IoT sales slidedeck every created (2nd version)The greatest IoT sales slidedeck every created (2nd version)
The greatest IoT sales slidedeck every created (2nd version)
 
Week6 how has_technology_changed
Week6 how has_technology_changedWeek6 how has_technology_changed
Week6 how has_technology_changed
 
Apt 510 slideshare
Apt 510 slideshareApt 510 slideshare
Apt 510 slideshare
 
Technological advances in ontario real estate
Technological advances in ontario real estateTechnological advances in ontario real estate
Technological advances in ontario real estate
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Mobile Convention'13 Presentation
Mobile Convention'13 PresentationMobile Convention'13 Presentation
Mobile Convention'13 Presentation
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
PG in Cyber Law
PG in Cyber LawPG in Cyber Law
PG in Cyber Law
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Cyber law for cyber generation
Cyber law for cyber generationCyber law for cyber generation
Cyber law for cyber generation
 

Ähnlich wie A Brief History of Electronic Signatures

24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
Signing away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless officeSigning away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless office
PaperSave
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
Ed Dickinson
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
 

Ähnlich wie A Brief History of Electronic Signatures (20)

Global E-signature Laws at a Glance | DrySign By Exela
Global E-signature Laws at a Glance | DrySign By ExelaGlobal E-signature Laws at a Glance | DrySign By Exela
Global E-signature Laws at a Glance | DrySign By Exela
 
electronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionelectronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introduction
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Signing away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless officeSigning away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless office
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
INFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology TimelineINFOGRAPHIC: Legal Technology Timeline
INFOGRAPHIC: Legal Technology Timeline
 
17 alessia frisina legal
17 alessia frisina legal17 alessia frisina legal
17 alessia frisina legal
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Digital Signatures: The Law and Best Practices for Compliance
Digital Signatures:  The Law and Best Practices for ComplianceDigital Signatures:  The Law and Best Practices for Compliance
Digital Signatures: The Law and Best Practices for Compliance
 
Informtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptxInformtion Technology Act 2000.pptx
Informtion Technology Act 2000.pptx
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
 
E commerce
E commerceE commerce
E commerce
 
Countries that have made electronic signatures legal
Countries that have made electronic signatures legalCountries that have made electronic signatures legal
Countries that have made electronic signatures legal
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic Signatures
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 

Mehr von Nitro, Inc.

Mehr von Nitro, Inc. (9)

Customer Survey Proves IT Satisfaction in Key Performance Areas
Customer Survey Proves IT Satisfaction in Key Performance AreasCustomer Survey Proves IT Satisfaction in Key Performance Areas
Customer Survey Proves IT Satisfaction in Key Performance Areas
 
Sustainability in the New World of Content and Documents
Sustainability in the New World of Content and DocumentsSustainability in the New World of Content and Documents
Sustainability in the New World of Content and Documents
 
Security in the New World of Content and Documents
Security in the New World of Content and DocumentsSecurity in the New World of Content and Documents
Security in the New World of Content and Documents
 
Thriving in the New World of Content and Documents
Thriving in the New World of Content and DocumentsThriving in the New World of Content and Documents
Thriving in the New World of Content and Documents
 
Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?
Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?
Nitro Infographic: Are Your Document Practices Slowing Down Your Productivity?
 
The Paperless Office: Why it Hasn't Happened, and Why It's Going To
The Paperless Office: Why it Hasn't Happened, and Why It's Going ToThe Paperless Office: Why it Hasn't Happened, and Why It's Going To
The Paperless Office: Why it Hasn't Happened, and Why It's Going To
 
How Your Document Habits are Destroying Productivity
How Your Document Habits are Destroying Productivity How Your Document Habits are Destroying Productivity
How Your Document Habits are Destroying Productivity
 
Breaking Bad Habits: Escape the Document Productivity Drain
Breaking Bad Habits: Escape the Document Productivity DrainBreaking Bad Habits: Escape the Document Productivity Drain
Breaking Bad Habits: Escape the Document Productivity Drain
 
Nitro Pro 9 - Live Demo Presentation
Nitro Pro 9 - Live Demo PresentationNitro Pro 9 - Live Demo Presentation
Nitro Pro 9 - Live Demo Presentation
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

A Brief History of Electronic Signatures

  • 1. eSigning 101: What, Why, When & How • 6 A QUICK HISTORY OF eSIGNATURES Some may think that eSignatures burst into the business world following the passing of ESIGN. But really, the history of eSignatures goes back much farther. Below is a high-level history of eSignatures, as well as groundbreaking laws and mandates that helped accelerate adoption: Mid-1800s Government officials and businesses use Morse code and the telegraph to electronically accept agreements. 1980s Fax machines are the most popular devices to electronically send contracts and other important documents between people and businesses. 1999 The National Conference of Commissioners develops the Uniform Electronic Transactions Act (UETA). UETA provides a legal framework for the use of eSignatures and records in government and business transactions. 2000 The Electronic Signatures in Global and National Commerce Act (ESIGN) is signed into federal law. The law states that a document or signature cannot be denied legal effect or enforceability because it is in electronic form. 2007 Apple releases the iPhone, which becomes one of the world’s most popular mobile devices. Widespread adoption of touchscreen devices is increasing demand for allowing eSigning on the go. 2010 Mobile app and payment company Square launches, empowering consumers to sign for products and services directly on mobile screens. eSigning 101: What, Why, When & How • 6