Understanding digital signatures and the law
Digital signatures promise to make doing business faster and easier. Don’t let a lack of legal clarity hamper your adoption efforts.
Digital signatures promise to make doing business faster and easier. Don't let a lack of legal clarity hamper your adoption efforts.
It's no secret that Australians have a healthy appetite for all things digital. Compared to other countries, we've been quick to embrace innovations including electronic forms, tap-and-go-payments and digital wallets.
True to form, Australia is also one of the world's fastest growing markets for digital signature adoption. Government agencies and enterprises use digital signatures for everything from streamlining patent applications to fast tracking bank loans.
Many small to medium businesses would like to do the same. But with limited time to navigate the murky world of digital signatures and the law, ink and paper signatures often seem the safer option.
It doesn't need to be this way. Here's a quick overview of what every business owner should know about digital signatures.
Fact: Digital signatures are valid in Australia
As far as Australian legislation is concerned, digital signatures have been an acceptable method for signing documents since 1999.
They stand up in court too. Australian court cases questioning the validity of digital signatures, including Getup Ltd v Electoral Commissioner, have been largely unsuccessful.
A digital signature can be just as valid as an ink and paper signature, provided that:
With some exceptions, like certain types of property transactions, almost any document signed with a digital signature can be considered valid. If unsure, seek legal advice before going ahead.
Digital signature adoption done right
While the law says businesses can use digital signatures, signature scrawls created in Microsoft Paint won't cut the legal mustard. In the unlikely event that you need to prove a digital signature's validity in court, following best practices will increase the likelihood of success.
1. Identify the documents that your customers, suppliers and team will sign digitally
The most appropriate type of digital signature will vary depending on the nature of the document. A business contract, for example, may require more protection against forgery and manipulation than an employee leave request.
2. Choose a reliable method
The law says that the method of signing must be as reliable as appropriate for the purposes that the document was created.
To minimise the risk of forgery or manipulation, select a reliable and secure digital signature method. Look for technologies that associate the signature with hidden data, such as private key and public key cryptology.
Your business may require one, or several, of the following signature methods:
3. Get consent
Before requesting a signature on a contract or document, check that the signatory has agreed to use a digital signing method. If in doubt about whether consent has been given, ask.
***
When implemented in the right way, digital signatures are secure, user-friendly and legally compliant. While the laws can be mystifying, following a best practice approach that harnesses the latest digital signature technologies will help to ensure positive outcomes.
Canon’s imageRUNNER ADVANCE Gen III Series III multifunction devices take advantage of McAfee Embedded Control to protect your business. This advanced solution helps you manage security policies and protects against the execution of unauthorised applications with intelligent whitelisting.
When you’re working with students and their families, and interfacing with the government, data security is paramount.
Canon’s iR-ADV Gen III Series III multifunction devices are packed with features to protect your business from cyber attacks and data breaches. Embedded features at startup and during operation help protect the boot process, firmware, and applications against tampering by malicious third parties.
Managing your information security is a complex business. Like any device connected to your network, your printers could be jeopardising your information security if not implemented and managed carefully.
In the 12 months since the Notifiable Data Breach Scheme came into effect, 964 breaches were reported. See which are the top reporting sectors, what types of information was leaked and what your business can learn to mitigate the risk internally.
Canon’s imageRUNNER ADVANCE Gen III Series III multifunction devices take advantage of McAfee Embedded Control to protect your business. This advanced solution helps you manage security policies and protects against the execution of unauthorised applications with intelligent whitelisting.
The Notifiable Data Breach Scheme came into effect on 22 February 2018. Since then, the total cost per data breach has cost Australian businesses an average of US$2.13 million. Can your organisation afford to continue ignoring the risks?
Confidentiality is essential in the legal profession and the stakes are high for your clients and your professional reputation. Canon’s iR-ADV Gen III Series III multifunction devices are designed to boost efficiency and are packed with security features to minimise the risk of cyber-attack.
Managing patient health records requires the strictest security protocols. Canon’s user-friendly iR-ADV Gen III Series III multifunction devices deliver the print, copy, fax and scan features you need within a networked environment, with multi-layered security to minimise your risk of a data breach.
In the new era of law, contracts are being completely re-designed or even re-imagined in various ways to make them easier to understand
As technology enters classrooms, auditoriums and libraries, it brings new risks to the education sector. All it takes is one click from a student device to potentially compromise your entire network. Faced with these various threats, does the education sector receive a ‘High Distinction’ for its efforts to protect its troves of student and staff data? Recent findings from the inaugural Canon Business Readiness Index on Security suggest not.