www.helpnetsecurity.com Open in urlscan Pro
44.225.203.90  Public Scan

URL: https://www.helpnetsecurity.com/2023/09/05/thorsten-hau-fidentity-digital-signatures-adoption/
Submission: On September 06 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1693966531"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle
upmagazine plus
 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Mirko Zorz, Director of Content, Help Net Security
September 5, 2023
Share


THE MISCONCEPTIONS PREVENTING WIDER ADOPTION OF DIGITAL SIGNATURES



In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses
the legal validity of qualified digital signatures, demonstrating their
equivalence to handwritten signatures when backed by robust identity
verification.

Opting for certified providers that adhere to standards like eIDAS or ZertES
ensures forgery-proof security. The balance between certification and user
experience is crucial to achieving seamless onboarding.



IN YOUR OPINION, WHAT MISCONCEPTIONS ABOUT DIGITAL SIGNATURES PREVENT WIDER
ADOPTION, AND HOW CAN THESE BE EFFECTIVELY ADDRESSED?

Many providers offer convenient digital signature solutions, allowing users to
sign documents with just a few clicks. But these signatures are neither secure
nor legally valid, and people have learned from their legal councils that they
need to use paper for relevant signatures. Qualified electronic signatures based
on solid identity verification and strict security standards are legally
equivalent to handwritten signatures and can be used for any kind of contract.
To drive adoption, we are promoting that once you have gone through the
onboarding and identification process, electronic signing is much faster than
any paper-based process.

HOW WOULD YOU ASSESS THE CURRENT LEVEL OF SECURITY PROVIDED BY DIGITAL SIGNATURE
PLATFORMS, AND HOW CAN THEY EFFECTIVELY TACKLE THE ISSUE OF SIGNATURE FORGING
AND FRAUD?

The variety of providers is huge, and the quality of signatures is completely
opaque to non-experts. A digital signature without the identification of the
signer is useless. To give signature forgery and fraud no chance at all, only
certified providers should be used. I’m not talking about ISO certification for
hosting but about providers who can prove certification for eIDAS or ZertES by
an accredited certification authority such as KPMG and who work with established
trust service providers.

SINCE INDUSTRIES LIKE GOVERNMENT, HEALTHCARE, AND BANKING ARE HEAVILY REGULATED,
HOW HAVE THESE SECTORS RESPONDED TO THE LEGALITY CONCERNS SURROUNDING DIGITAL
SIGNATURES? WHAT STEPS HAVE THEY TAKEN TO INTEGRATE DIGITAL SIGNATURES INTO
THEIR OPERATIONS?


Organizations and companies can be categorized into three levels of maturity:

 * Denial: These organizations choose to ignore development and stick to
   outdated and costly paper processes.
 * Bleeding: These organizations acknowledge the need for digitalization but
   often struggle through a challenging learning curve. They invest heavily in
   bespoke solutions that are expensive to conceptualize, install, and maintain.
   Unfortunately, these solutions are not scalable and cannot be applied to
   different processes.
 * Trusting: These organizations place their trust in competent and certified
   providers who understand their unique requirements, possess the technical
   expertise and knowledge of regulatory requirements to offer identity-based
   signing, which enables them to eliminate paper-based processes.

WHAT ADVICE WOULD YOU GIVE TO ORGANIZATIONS IN HIGHLY REGULATED INDUSTRIES THAT
ARE HESITANT TO ADOPT DIGITAL SIGNATURES DUE TO LEGALITY CONCERNS?

In my opinion, two aspects are crucial. On the one hand, organizations should
rely on a service provider that is certified according to eIDAS or ZertES
standards. On the other hand, user experience should never be underestimated as
it plays a crucial role in the onboarding process. Providing an intuitive and
seamless user experience not only enhances acceptance but also boosts the
conversion rate, empowering organizations to achieve their goals more
effectively.

WHAT ARE THE MAJOR COMPLIANCE CHALLENGES THAT ORGANIZATIONS FACE WHEN
IMPLEMENTING E-SIGNATURES, AND HOW CAN THEY PREPARE FOR THESE CHALLENGES TO
AVOID FINES OR SANCTIONS?

When it comes to digital signatures, organizations should not be easily swayed
by providers who simply boast extensive PDF handling capabilities. While PDF
management is important, the real essence of digital signing lies in the
accurate identification of the signer and the subsequent secure authorization of
individual signatures. It’s crucial to have a seamless integration between the
identification process and the signing itself, ideally facilitated by a single
provider from end-to-end (e2e). By ensuring a comprehensive solution that covers
the complete signing journey, organizations can guarantee a robust and secure
digital signature process.

CONSIDERING THE UPFRONT COSTS OF IMPLEMENTING A DIGITAL SIGNATURE SYSTEM, CAN
YOU SHARE ANY DATA OR EXAMPLES HIGHLIGHTING THE LONG-TERM ROI ORGANIZATIONS HAVE
EXPERIENCED AFTER ADOPTING THIS TECHNOLOGY?

There’s a common misconception that digital signatures require huge upfront
costs. However, by choosing the right provider, you can achieve a remarkable 10x
reduction in expenses compared to traditional paper-based processes. This leads
to a significant ROI, which can be even achieved during the ramp-up period.

CAN YOU PROVIDE INSIGHTS INTO HOW THE ESIGNATURE DIRECTIVE IN EUROPE HAS
IMPACTED THE LEGAL RECOGNITION AND USAGE OF ELECTRONIC SIGNATURES ACROSS MEMBER
STATES?

The importance of the eSignature Directive cannot be overstated. It has brought
legal clarity and even influenced anti-money laundering (AML) regulations in
numerous states. Consequently, we now have a situation where the standard of
identity assurance is equivalent for AML and digital signatures. This has
streamlined the implementation of digital signatures for banks and other
financial service providers since they can kill two birds with one stone: They
identify the new client once and put a qualified signature on the contract. This
way they comply with AML regulation and have a contract in place that does not
place any limitations on services that can be provided.




More about
 * certification
 * compliance
 * cybersecurity
 * digital signature
 * fidentity
 * government
 * healthcare
 * identity
 * identity verification
 * PDF
 * regulation
 * security ROI

Share this

FEATURED NEWS

 * Atlas VPN zero-day allows sites to discover users’ IP address
 * LockBit leaks sensitive data from maximum security fence manufacturer
 * Connected cars and cybercrime: A primer

CIS Benchmarks Communities: Where configurations meet consensus


SPONSORED


EBOOK: 9 WAYS TO SECURE YOUR CLOUD APP DEV PIPELINE


FREE ENTRY-LEVEL CYBERSECURITY TRAINING AND CERTIFICATION EXAM


GUIDE: ATTACK SURFACE MANAGEMENT (ASM)




DON'T MISS


ATLAS VPN ZERO-DAY ALLOWS SITES TO DISCOVER USERS’ IP ADDRESS


LOCKBIT LEAKS SENSITIVE DATA FROM MAXIMUM SECURITY FENCE MANUFACTURER


CONNECTED CARS AND CYBERCRIME: A PRIMER


THE MISCONCEPTIONS PREVENTING WIDER ADOPTION OF DIGITAL SIGNATURES


WHY END-TO-END ENCRYPTION MATTERS




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×