{"id":21624,"date":"2020-05-18T07:41:04","date_gmt":"2020-05-18T05:41:04","guid":{"rendered":"https:\/\/mailcommsgroup.com\/blog\/the-definitive-checklist-on-electronic-signature-security\/"},"modified":"2023-09-08T09:34:03","modified_gmt":"2023-09-08T07:34:03","slug":"the-definitive-checklist-on-electronic-signature-security","status":"publish","type":"post","link":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/","title":{"rendered":"The definitive checklist on electronic signature security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1547557263471{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; el_class=&#8221;El nuevo reglamento europeo obliga a recabar el consentimiento expl\u00edcito para el tratamiento de los datos de car\u00e1cter personal&#8221; font_color=&#8221;#81d742&#8243;][vc_column_text dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1678883909648{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<h2>No organization wants to have security scars. That&#8217;s why IT and IT security departments generally perform <em>due diligence<\/em> on their <em>cloud hosting <\/em>services and software providers to protect against data breaches, <strong><br \/>\n  <a href=\"https:\/\/mashable.com\/archive\/data-breach-infographic\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>data loss<\/u><br \/>\n  <\/a><br \/>\n<\/strong>, <strong><br \/>\n  <em>malware<\/em><br \/>\n<\/strong>, <strong><a href=\"https:\/\/www.onespan.com\/topics\" target=\"_blank\" rel=\"noopener noreferrer\"><u>viruses<\/u><\/a> <\/strong>y <strong><a href=\"https:\/\/www.onespan.com\/products\/fido\" target=\"_blank\" rel=\"noopener noreferrer\"><em><u>phishing<\/u><\/em><\/a> <\/strong>and other security threats. To help defend your organization, we have compiled an electronic signature security checklist. <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/products\/electronic-signature\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>electronic signature<\/u><br \/>\n  <\/a><br \/>\n<\/strong> specifically for evaluating <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/products\/esignature-professional-plan\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>electronic signature services<\/u><br \/>\n  <\/a><br \/>\n<\/strong>. This checklist takes a holistic approach to security. We recommend looking not only at the security of the service, but also at how signers are authenticated, the provider&#8217;s approach to document and signature security, as well as the audit trail associated with the digital transaction.<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1614771623714{margin-top: 30px !important;margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; el_class=&#8221;El nuevo reglamento europeo obliga a recabar el consentimiento expl\u00edcito para el tratamiento de los datos de car\u00e1cter personal&#8221; font_color=&#8221;#81d742&#8243;][vc_single_image image=&#8221;5207&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1555933626160{margin-top: 0px !important;padding-top: 20px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1547557427896{padding-top: 0px !important;}&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h3><strong>User authentication<\/strong><\/h3>\n<p>Electronic signature laws do not say much when it comes to security techniques and technology, but the legal definition of an electronic signature always includes language about the identity of the signer. This means that you need:<\/p>\n<ul>\n<li>Authenticate users before signing electronically.<\/li>\n<li>Associate this authentication with the electronic signature and the electronically signed record.<\/li>\n<\/ul>\n<h4 style=\"margin-top: 30px;\"><strong>What to look for:<\/strong><\/h4>\n<ol>\n<li>A solution that supports <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/resources\/user-identification-and-authentication\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>multiple authentication methods<\/u><br \/>\n  <\/a><br \/>\n<\/strong> such as:<\/li>\n<\/ol>\n<ul>\n<li>Remote user authentication via user ID \/ password.<\/li>\n<li>Verification of e-mail address by invitation to electronic signature session.<\/li>\n<li>Authentication of remote users through secret questions and answers (also known as challenge-answer).<\/li>\n<li>Ability to leverage existing credentials.<\/li>\n<li>Dynamic KBA (Knowledge Based Authentication) through third party databases (e.g. <strong>Equifax<\/strong>).<\/li>\n<li>Support for digital certificates.<\/li>\n<li>Ability to upload images as part of an electronic signature transaction, e.g., driver&#8217;s license photo.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li>The ability to configure different authentication methods within the same transaction.<\/li>\n<li>Flexibility to adapt the authentication methods to your organization&#8217;s risk profile and to automate each process (e.g. customize the challenge-answer questions and the number of questions according to your requirements).<\/li>\n<li>Flexible options for face-to-face signature attribution, including affidavits and password in an SMS (PIN) sent to a personal mobile device (check if user authentication via SMS is included free of charge).<\/li>\n<\/ol>\n<p>After assessing the user&#8217;s authentication capabilities, the next step will be to verify that the electronic signature service captures the authentication as part of the document&#8217;s audit trail and integrates the audit trail into the electronically signed document.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; type=&#8221;grid&#8221; css=&#8221;.vc_custom_1614774085932{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #eaeaea !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; dp_animation=&#8221;&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h3>Electronic signature. Security and Confidence<\/h3>\n<p>Establishes digital trust through security, authentication, verification and reliability.[\/vc_column_text][vc_btn title=&#8221;DOWNLOAD NOW&#8221; style=&#8221;classic&#8221; shape=&#8221;round&#8221; size=&#8221;lg&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.onespan.com%2Fresources%2Felectronic-signature-security-trust|target:_blank|&#8221; el_class=&#8221;boton-blog&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; dp_animation=&#8221;&#8221;][vc_single_image image=&#8221;5223&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1555933626160{margin-top: 0px !important;padding-top: 20px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1547557427896{padding-top: 0px !important;}&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h3><strong>Integrated audit trail<\/strong><\/h3>\n<p>Electronically signed documents that can be verified and archived independently of the electronic signature provider provide an additional layer of security. Whether or not you maintain an account with the electronic signature service in the future, your documents will not be affected, as you, your clients and other interested parties do not have to connect to the Internet to access or verify the electronically signed document.<\/p>\n<p>The only way to achieve vendor independence is to have a solution that incorporates electronic signatures. <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/products\/electronic-signature\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>electronic signatures<\/u><br \/>\n  <\/a><br \/>\n<\/strong>time stamping and the audit trail directly into the document. This creates an autonomous and transferable record.<\/p>\n<h4 style=\"margin-top: 30px;\"><strong>What to look for:<\/strong><\/h4>\n<ul>\n<li>Ability to verify the authenticity of the document independently of the electronic signature service. This means that you don&#8217;t need to worry about whether a verification link will still be valid several years from now or if it will give a 404 &#8220;page not found&#8221; error message.<\/li>\n<li>Ability to index, store and retrieve the electronically signed document in the system of record of your choice, not in the provider&#8217;s cloud storage service. This helps you meet your organization&#8217;s long-term retention requirements.<\/li>\n<\/ul>\n<h3 style=\"margin-top: 30px;\"><strong>Document and signature security<\/strong><\/h3>\n<p>You are looking for an electronic signature solution that packages and secures the final signed document through a digital signature. <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/products\/digital-signature\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>digital signature<\/u><br \/>\n  <\/a><br \/>\n<\/strong>. The electronic signature solution must apply the digital signature at two levels:<\/p>\n<ol>\n<li>At the <strong>signature level <\/strong>to avoid manipulation of the signature itself.<\/li>\n<li>At <strong>document <\/strong>level to prevent manipulation of document content.<\/li>\n<\/ol>\n<p>The security of the <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/products\/digital-signature\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>digital signature<\/u><br \/>\n  <\/a><br \/>\n<\/strong> links the signature intent with the information agreed upon at the time of signing. It also locks and protects the electronically signed document from tampering, so unauthorized changes cannot go unnoticed.<\/p>\n<p>While vendors such as DocuSign apply a digital signature that functions as the envelope of a document (once all signatures have been captured), this is not a recommended practice. This approach leaves the document and signatures unprotected while the process is completed and results in incorrect date and time stamping on individual signatures. If a signer and a co-signer electronically sign a record on two separate days, you need that fact to be reflected in the audit trail. Best practice is to apply digital signature encryption <strong>as each electronic signature is added to the document<\/strong>. This creates a comprehensive audit trail with the date and time each signature was made.<\/p>\n<h4><strong>What to look for:<\/strong><\/h4>\n<ul>\n<li>The document must be protected with a digital signature.<\/li>\n<li>Each signature must be secured with a digital signature.<\/li>\n<li>A comprehensive audit trail should include the date and time of each signature.<\/li>\n<li>The audit trail must be securely integrated into the document.<\/li>\n<li>The audit trail must be linked to each firm.<\/li>\n<li>Possibility to check the validity of the signed record offline, without going to a website.<\/li>\n<li>One-click signature and document verification.<\/li>\n<li>Ability to download a verifiable copy of the signed record with the audit trail.<\/li>\n<li>The document must be accessible to all parties.<\/li>\n<\/ul>\n<h3 style=\"margin-top: 30px;\"><strong>Audit trail of the signature process<\/strong><\/h3>\n<p>When regulated companies undergo a compliance audit, they are <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/blog\/are-you-able-prove-compliance-external-auditors\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u><em>compliance<\/em> audit, they are often<\/u><br \/>\n  <\/a><br \/>\n<\/strong>audit, they are often asked to prove the exact business process they followed. As part of this, auditors also seek a record of when key documents are touched, when and by whom.<\/p>\n<p>We recommend capturing a comprehensive audit trail of the signing process, as it allows you to demonstrate exactly <strong>how<\/strong> a customer completed a transaction on the web or via a mobile device. Most electronic signature <strong><a href=\"https:\/\/www.onespan.com\/products\/electronic-signature\" target=\"_blank\" rel=\"noopener noreferrer\"><u>electronic signature solutions on the market<\/u><\/a> <\/strong>solutions on the market fall short when demonstrating compliance because they do not have the ability to capture a complete record of the signer&#8217;s actions.<\/p>\n<h4><strong>What to look for:<\/strong><\/h4>\n<p>A solution that captures information about the process used to capture signatures includes:<\/p>\n<ul>\n<li>IP address.<\/li>\n<li>Date and time stamp of all events.<\/li>\n<li>All web pages, documents, disclosures and other information presented.<\/li>\n<li>The amount of time spent reviewing each document.<\/li>\n<li>What each party acknowledged, agreed and signed.<\/li>\n<li>All other actions taken during the transaction.<\/li>\n<\/ul>\n<p>As part of this, check if you have the ability to search, find and replay the audit trail process of a specific transaction for auditors or other business stakeholders with just a few clicks.<\/p>\n<h3 style=\"margin-top: 30px;\"><strong>Cloud security<\/strong><\/h3>\n<p>In addition to the criteria listed above, it looks at the protocols that an electronic signature <strong><a href=\"https:\/\/www.onespan.com\/products\/esignature-professional-plan\" target=\"_blank\" rel=\"noopener noreferrer\"><u>electronic signature provider has in place<\/u><\/a> <\/strong>to identify and prevent data breaches. It is important to know the supplier&#8217;s safety practices, certifications, record keeping and the frequency of their safety audits. Failure to pay close attention to a provider&#8217;s security infrastructure and practices could expose us to security breaches, data loss \/ data leakage incidents or other risks, such as insufficient cloud security expertise.<\/p>\n<h4><strong>What to look for:<\/strong><\/h4>\n<ul>\n<li>Verify that the e-signature platform uses strong data encryption in transit and at destination, and stores data within an encrypted database volume to ensure an encrypted channel for all communications.<\/li>\n<li>A provider that partners with cloud infrastructure service providers around the world, such as <strong><br \/>\n  <a href=\"https:\/\/aws.amazon.com\/es\/\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>Amazon Web Services<\/u><br \/>\n  <\/a><br \/>\n<\/strong>, <strong><br \/>\n  <a href=\"https:\/\/www.ibm.com\/cloud\/info\/softlayer-is-now-ibm-cloud\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>IBM SoftLayer<\/u><br \/>\n  <\/a><br \/>\n<\/strong> o <strong><br \/>\n  <a href=\"https:\/\/azure.microsoft.com\/en-ca\/\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>Microsoft Azure<\/u><br \/>\n  <\/a><br \/>\n<\/strong>. These cloud providers are designed and managed in accordance with security best practices and comply with a variety of regulatory, industry, and IT standards for data security and protection, including: ISO 27001, SOC 1\/2\/3, HIPAA, FIPS 140-2, FISMA, and many more.<\/li>\n<li>In addition to leveraging cloud service providers that follow compliance programs and frameworks for security and data protection at the cloud level, we are also leveraging cloud service providers that follow compliance programs and frameworks for security and data protection at the cloud level.  <em>data center<\/em>If you are a vendor, partner with a vendor that meets the additional requirements for security control and compliance at the application layer. This ensures that the electronic signature solution is secure and that customer data is protected.<\/li>\n<li>Global <em>data centers<\/em> to meet in-country data residency requirements.<\/li>\n<\/ul>\n<p>For more information about our certifications and warranties, please visit the <strong><br \/>\n  <a href=\"https:\/\/support.onespan.com\/csm\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>Trust Center<\/u><br \/>\n  <\/a><br \/>\n<\/strong> of <strong>OneSpan<\/strong>, the electronic signature provider that <strong>MailTecK &amp; Customer Comms<\/strong> works with, or download the technical document that will help you identify the <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/resources\/electronic-signature-security-trust\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>security requirements<\/u><br \/>\n  <\/a><br \/>\n<\/strong> for evaluating e-signature solutions.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; type=&#8221;grid&#8221; css=&#8221;.vc_custom_1614774198405{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-color: #eaeaea !important;}&#8221;][vc_column dp_animation=&#8221;&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h3><strong>What is the definitive list for electronic signature security verification?<\/strong><\/h3>\n<ol>\n<li>User authentication<\/li>\n<li>Integrated audit trail<\/li>\n<li>Document and signature security<\/li>\n<li>Audit trail of the signature process<\/li>\n<li>Cloud security<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221;][vc_column dp_animation=&#8221;&#8221;][vc_column_text dp_animation=&#8221;&#8221;][1] Gartner, Inc., SOC certification could be a guarantee of security &#8230; or it might not be<\/p>\n<p>Content extracted from <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/blog\/ultimate-e-signature-security-checklist\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\n    <u>OneSpan<\/u><br \/>\n  <\/a><br \/>\n<\/strong>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1547557263471{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; el_class=&#8221;El nuevo reglamento europeo obliga a recabar el consentimiento expl\u00edcito para el tratamiento de los datos de car\u00e1cter personal&#8221; font_color=&#8221;#81d742&#8243;][vc_column_text dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1678883909648{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;] No organization wants to have security scars. That&#8217;s why IT and IT security departments generally perform due diligence on their cloud [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":5208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[480,481],"class_list":["post-21624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-solutions-with-legal-value","category-omnichannel-communication-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The definitive checklist on electronic signature security - Mailcomms Group<\/title>\n<meta name=\"description\" content=\"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The definitive checklist on electronic signature security - Mailcomms Group\" \/>\n<meta property=\"og:description\" content=\"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailcomms Group\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T05:41:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T07:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"623\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alberto Fidalgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:site\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alberto Fidalgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\"},\"author\":{\"name\":\"Alberto Fidalgo\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\"},\"headline\":\"The definitive checklist on electronic signature security\",\"datePublished\":\"2020-05-18T05:41:04+00:00\",\"dateModified\":\"2023-09-08T07:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\"},\"wordCount\":1812,\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg\",\"articleSection\":[\"Communication solutions with legal value\",\"Omnichannel communication solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\",\"name\":\"The definitive checklist on electronic signature security - Mailcomms Group\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg\",\"datePublished\":\"2020-05-18T05:41:04+00:00\",\"dateModified\":\"2023-09-08T07:34:03+00:00\",\"description\":\"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg\",\"width\":892,\"height\":623,\"caption\":\"checklist firma electronica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mailcomms Group\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The definitive checklist on electronic signature security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"name\":\"MailComms Group\",\"description\":\"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.\",\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"alternateName\":\"MailComms Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\",\"name\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\",\"alternateName\":\"MailComms Group\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"width\":512,\"height\":512,\"caption\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CommsCustomer\",\"https:\/\/www.linkedin.com\/company\/customercomms\/\",\"https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\",\"name\":\"Alberto Fidalgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"caption\":\"Alberto Fidalgo\"},\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The definitive checklist on electronic signature security - Mailcomms Group","description":"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/","og_locale":"en_US","og_type":"article","og_title":"The definitive checklist on electronic signature security - Mailcomms Group","og_description":"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.","og_url":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/","og_site_name":"Mailcomms Group","article_published_time":"2020-05-18T05:41:04+00:00","article_modified_time":"2023-09-08T07:34:03+00:00","og_image":[{"width":892,"height":623,"url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg","type":"image\/jpeg"}],"author":"Alberto Fidalgo","twitter_card":"summary_large_image","twitter_creator":"@CommsCustomer","twitter_site":"@CommsCustomer","twitter_misc":{"Written by":"Alberto Fidalgo","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#article","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/"},"author":{"name":"Alberto Fidalgo","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214"},"headline":"The definitive checklist on electronic signature security","datePublished":"2020-05-18T05:41:04+00:00","dateModified":"2023-09-08T07:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/"},"wordCount":1812,"publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg","articleSection":["Communication solutions with legal value","Omnichannel communication solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/","url":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/","name":"The definitive checklist on electronic signature security - Mailcomms Group","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg","datePublished":"2020-05-18T05:41:04+00:00","dateModified":"2023-09-08T07:34:03+00:00","description":"We protect against data breaches, data loss, malware, viruses and phishing and other e-signature security threats.","breadcrumb":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#primaryimage","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2020\/05\/checklist-firma-electronica.jpg","width":892,"height":623,"caption":"checklist firma electronica"},{"@type":"BreadcrumbList","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/the-definitive-checklist-on-electronic-signature-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mailcomms Group","item":"https:\/\/mailcommsgroup.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/mailcommsgroup.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The definitive checklist on electronic signature security"}]},{"@type":"WebSite","@id":"https:\/\/mailcommsgroup.com\/en\/#website","url":"https:\/\/mailcommsgroup.com\/en\/","name":"MailComms Group","description":"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.","publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"alternateName":"MailComms Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailcommsgroup.com\/en\/#organization","name":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.","alternateName":"MailComms Group","url":"https:\/\/mailcommsgroup.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","width":512,"height":512,"caption":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal."},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CommsCustomer","https:\/\/www.linkedin.com\/company\/customercomms\/","https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ"]},{"@type":"Person","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214","name":"Alberto Fidalgo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","caption":"Alberto Fidalgo"},"url":"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/"}]}},"_links":{"self":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/comments?post=21624"}],"version-history":[{"count":1,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21624\/revisions"}],"predecessor-version":[{"id":21654,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21624\/revisions\/21654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media\/5208"}],"wp:attachment":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media?parent=21624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/categories?post=21624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}