Guidelines for the Use of eSignatures

The signer is asked to provide identifying information (userID, Social Security Number, etc.) and a shared secret (something that both parties know) such as a PIN or password. Once the information is entered, the system authenticates the signer by checking that the shared secret is indeed the one that was established for the claimed identity. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download