Legal Compliance

Key Parameters of eSignature Compliance

Intent to Sign using eSignature

Users of SutiSign have the option to sign documents in paper or electronically whichever they find easier. When using eSignature, both parties must mutually agree to use electronic signatures and signers on their own (without any enforcement) should be willing to sign using electronic signatures.

Validity of Electronic Document

Electronic signatures created and documents signed using SutiSign have the same legal effect, validity and enforceability as wet signatures and paper-based documents. The system retains the signed and encrypted documents.

Electronic Signature and Document Association

Once a signature is created for a signer, it is securely stored in the signer's account for future use and cannot be used by anyone else with unauthorized access.

After signing, the signature and the signed document are locked for editing and cannot be modified by any user.

Validate Documents

The systems retains the signed and encrypted documents. The Validate feature allows senders to validate a document's authenticity as needed. At anytime, a presented document can be validated against what was signed in the SutiSign solution. The solution performs various tasks to determine whether the document is valid or not.

Signed documents are encrypted with 128-bit encryption and securely stored in the request creators and signers account for future reference. These are accessible only after a user (request creator/signer) successfully logs into their SutiSign account.

Values entered for user-defined fields in a document are encrypted, securely stored in the users account and are automatically populated whenever the same fields appear across other documents.

Audit Trail

Details of all the actions performed on a document are displayed within the solution and in any signed document downloaded from SutiSign. These transaction details can be reproduced at any time and act as audit trails.

Authentication

SutiSign enables a variety of methods for authenticating users. These methods include email address verification, biometric signature verification, fingerprint verification, and IP address capturing, etc. Only after successful authentication, users are given access to SutiSign and documents are signed.

Read the full eSignature Acts/Laws

  1. Electronic Signature in Global and National Commerce (ESIGN)
  2. Uniform Electronic Transactions Act (UETA)
  3. EU Directives