Story image

Secured Signing and LawHawk take secure document signing to NZ law industry

11 Oct 2017

New Zealand tech businesses LawHawk and Secured Signing are taking secure document signatures to the law industry, thanks to a partnership that created an integrated way to fuse document automation and secure signatures.

The two companies built a Secure Signing integration which can be inserted into any of LawHawk’s automated document templates.

The Secure Signing integration includes what the companies call ‘smart tags’, which are formatted text pieces that include additional security features such as verification, two-factor authentication, alerts and managing multiple signatories and documents.

“When I first saw how the Secured Signing system works, I could tell it was a natural fit for our document automation system and something I wanted to start using. We have now built a Secured Signing integration which we can drop into any of our automated document templates so that users can automatically create Secured Signing Smart Tags,” explains LawHawk managing director Gene Turner.

Law firms often faced issues when trying to authenticate signed documents.

Those issues included figuring out if the document was changed after it was signed, or who signed the document in the first place – especially in the case of illegible signatures with no other information.

“The benefit of using digital signatures by legal professionals is that it adds security and certainty. It is a fast and convenient way to get documents signed and the cost of digital signing is small relative to the benefits it delivers,” comments Secured Signing managing director Mike Eyal.

In addition to two-factor authentication that uses mobile phone codes as part of the authentication process, professionals can add minimum time periods for reviewing the document and force-scrolling to the bottom to accept it.

“Lawyers often pass these risks onto their clients by adding assumptions to legal opinions on these matters,” a statement from both companies says.

Users are also to sign documents across any mobile device.

Law firms can go as far as requiring processes in which a signatory must record a video of themselves, thus proving proof that a certain person signed a document.

Secured Signing believes this is a more sophisticated use of biometrics than fingerprint and image-based methods.

"Our primary goal for Secured Signing is to make it quick and simple for the document signer while delivering the most secure, authentic and reliable outcome for the document owner," Eyal comments.

"Video confirmation does exactly that, taking just a few seconds for the signer while giving the document owner a signed document that cannot be reasonably challenged."

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."