LAST FEW DAYS
Start 50 Plan: From R$69 to R$59/month and Plus 50 Plan: From R$119 to R$99/month.
How electronic signatures guarantee the integrity of electronically signed documents

How electronic signatures guarantee the integrity of electronically signed documents

Publicado em:
13
/
08
/
2020

The integrity of electronically signed documents is a topic of increasing relevance in the digital age, where the authenticity and security of information are fundamental to commercial, legal, and administrative operations.

One of the biggest doubts when implementing electronic signatures is about the integrity of electronically signed documents. How can I be sure that a signed contract will not change? The answer lies in a set of advanced technologies and practices that ensure that any modification to the document after signature is detectable. We will understand more in this article.

The integrity of electronically signed documents

One of the security criteria for maintaining the integrity of electronically signed documents is Hashing — IT HAS 256, an algorithm that guarantees the integrity of signed electronic documents. It ensures that any type of record is not changed, since its function compares previously calculated values. It's as if the algorithm transformed the document into a number. If there is any change in this document, however minor, the number also becomes different and when comparing the values, the algorithm reveals the attempt at tampering. Thus, those who sign are sure that the signed file will not be changed.

Subscription log

Another procedure to ensure integrity is the document number and the Log. When a contract or any other material that has to be signed is uploaded, that file is registered with a unique number. The Log will have that same number.

The Log is designed to record subscriptions and other relevant information, such as time and IP addresses.

Each message sent through the platform is also registered with a unique number.

The times are marked by the server clock and synchronized with the National Observatory, via NTP (Network Time Protocol), a reliable and highly accurate synchronization protocol.

Also, to guarantee the integrity of electronically signed documents, watermarks are used so that the printed copies of the signed files are easily identified with the document's unique number.

Information control

The electronic signature platform performs strict information control, such as authentication procedures and restricting employee access to customer data.

Authentication procedures

Authentication procedures are part of security, which together with the integrity of electronic documents, ensure the protection of signers. These procedures begin with the registration of electronic signature users. User data, such as CPF, must be verified. The Clicksign platform integrates with the IRS to verify that the documents provided are valid and legal.

The password is one of the security measures of an electronic signature platform. The user will need it to log in to the account, sign a document, create a subscription list, and perform other actions. But it's up to the user himself to create a strong password and keep it confidential. Other security measures with the password are: change it frequently and not disclose it to anyone. The electronic signature platform can use the latest technology to ensure the protection of passwords in the system.

Other actions can be used to keep an electronic signature account secure. One of them is the token. It is used for two-factor authentication. Thus, the system asks for a password and a token, which is a temporary code generated automatically. The token can be sent to the cell phone, via SMS, or to email. If the user changes their telephone number, it is important that they register their new number on the platform before this change. That way he won't run the risk of sending a token going to his old phone.

Privacy of the user in the electronically signed documents

To guarantee user privacy, the electronic signature platform adopts procedures to double-encrypt the stored files. The first encryption takes place on the platform's servers and the second is programmed to take place on Amazon's S3 servers, before the data is saved.

Another instrument that helps maintain privacy is encryption in transmissions. For this purpose, the Secure Sockets Layer (SSL) with extended validation and 256-bit encryption is used, which protects user data during transmission over public networks.

Users' credit card information is not stored on the platform but by the listed payment solution providers. This reduces the risk of this data being leaked in any way.

Thus, through this article, you can verify that the integrity of electronic documents is something that is really taken seriously when it comes to electronic signatures. It is very important that this be the case, as this is what guarantees that it is, in fact, safe to sign a document through our platform. All of these security procedures, together, create the necessary conditions for the legal validity of the signed documents.