How to Authenticate E-Signatures in Government


Recorded On: July 9, 2015

Cost reduction and paperless initiatives by government agencies spurred the adoption of electronic signatures but more and more, e-signatures are seen as a core digital-enabling technology for organizations wanting to achieve a completely digital mandate. Many government employees and military personnel are tasked with completing much of their work away from the office, creating a need to easily and securely complete adhoc processes on-the-go using tablets and other mobile devices. With e-signatures being the technology that achieve this mandate, concerns around authentication arise as this is what plays a crucial role in an e-process and helps ensure enforceability.

In this 60-minute webcast, OneSpan is joined by Michele Thomas, Chief Information Security Officer of USDA APHIS, in a tutorial reviews the four levels of authentication for federal information systems, and explains the OMB’s five-step process for implementing the proper level of assurance for remote authentication, with particular attention to how it relates to e-signatures. Finally, Michele will address how the Government’s Identity, Credential, and Access Management Program relates to e-signatures.

Webcast Highlights include:

  • The difference between electronic signatures and digital signatures;
  • The legal and Government requirements and considerations related to authenticating e-signers;
  • How to e-sign using digital certificates stored on CAC or PIV smart card;
  • Use cases from your peers.

This is a must-watch session for government agencies and departments preparing to design an e-process.

Watch Now!