DIGITAL SIGNING OF DOCUMENTS
E-signatures are a key component of digital operations – particularly for those companies that intend to use digitalization as a tool for growth and revenue increase – and an essential feature of comprehensive document life cycle management and inward digitalization efforts.
Using the InDoc EDGE information management platform for digital signing enables you to accelerate digitalization and ensure the compliance of your business. In cooperation with qualified trust service providers, we provide you with simple, advanced and qualified e-signing. Improve the customer experience and enable your business processes to run smoothly and efficiently.
E-SIGNATURES TAILORED TO YOUR NEEDS AND YOUR CUSTOMERS' EXPECTATIONS
- Qualified electronic signature
- Advanced electronic signature
- Simple electronic signature
ENSURING COMPLIANCE WITH THE APPROPRIATE E-SIGNATURES
With InDoc EDGE, you can combine various types and modes of e-signatures and provide your customers, partners and co-workers with an optimal digital experience in the Cloud or on your premises.
At Mikrocop, we enable qualified signing in cooperation with qualified trust service providers. Remote signing is a modern and most user-friendly mode of e-signing, as it does not require dedicated hardware or software. As a result, signatories can easily sign documents on any device and in any browser. The signatory’s e-identity is securely stored on a remote device for creating qualified electronic signatures and verified with strong multifactor authentication.
Your co-workers and the stakeholders with whom your employees share the documents that need to be signed can securely sign them using their digital certificates, which are on the EU trust list. InDoc EDGE users can therefore sign a document in the document management system, or initiate signing as a process activity in your business processes. However, the signatories will need a component for PKI based digital signing, and signing is only possible on Windows PCs.
In some cases, a simple electronic signature is quite sufficient. You can sign via InDoc EDGE with a click, mouse or your finger, a digital certificate that is not on the EU trust list, but has been added as a trusted means of e-identification to the InDoc EDGE repository, or with a sign-pad. All documents signed with a simple e-signature are additionally signed with a Mikrocop digital certificate and time stamped after each signature.
Sign-pads can be a welcome alternative to other modes of e-signatures if these cannot be used for one reason or another, especially when the physical presence of a customer is required or for less tech-savvy individuals. By using sign-pads you can effectively avoid dealing with paper documents without interfering with customers' routines. Your clients will sign documents the way they always have, i.e. by hand, and the system will capture the signature, convert it to digital and add it to the electronic document.
Type of e-signature
Modes of e-signatures
At Mikrocop, we also advise you on how to assess the level of risk of identity theft regarding your business processes, stakeholders, document types and user profiles. Depending on the required level of assurance, you can then easily determine the proper type of e-signature and consequently enable only the suitable e-signatures.
BENEFITS OF DIGITAL SIGNING WITH InDoc EDGE PLATFORM
We take a fully integrated approach to digitalization to deliver operational efficiency,
security and compliance to your business.
We ensure the validity
of your business documents
and facilitate corporate compliance.
We continually invest in
maintaining a high level of security and
in preventing confidential data leakage.
The level of assurance of an electronic identification (eID) determines the level of confidence that a person who shares a certain identity in a process is in fact the person to whom this identity is assigned. The means of electronic identification, e.g. a user profile on a social network or a digital certificate, have different authentication assurance levels.
The eID means differ in the methods used for identity proofing and verification upon the issuance of eID means, the procedure of issuing, delivery and activation of eID means, the methods of management of the means, resilience to security threats, and the number of authentication factors needed to complete the authentication process.
Risk is assessed based on a set of criteria that refer to the consequences of incorrect user authentication, identity fraud or misuse, i.e. the legal consequences, reduction or loss of reputation, economic loss and accountability, impact on our activities and unauthorized disclosure of personal data.
The level of risk depends on the level of loss that might incur in the event of authentication failure or identity fraud and the likelihood of such an event. A higher risk level requires a higher level of assurance for the used electronic identification means.
When assessing the risk, the following criteria should be taken into account as a minimum:
- What are the legal implications of identify fraud or authentication failure?
- Are there any specific statutory requirements in relation to assurance levels?
- Can unauthorized persons access personal data?
- Can identity fraud cause a change in the identification data in data registers?
- What economic loss may result from identity fraud or inaccurate identification?
- Can fraud or irregularities affect the personal and legal safety and health of the user?
The selection of criteria can be modified as desirable on the condition that all key factors have been taken into account and that the same criteria are used to assess the risk of all the processes where identification is required.
Normally yes, with the exception of certain documents for which an e-signature is not permitted by way of sectoral legislation. Examples of such documents include bonds, cheques, and bills of exchange...
Biometric measures may only be implemented in the private sector if this is urgently required for the purpose of providing an activity, ensuring the safety of persons or property, or protecting classified information or trade secrets. Prior to the implementation of any biometrics, we need to submit a description of projected biometric measures to the Information Commissioner, along with the grounds for their implementation. Such measures can only be introduced once permission has been received from the Information Commissioner.