1. Introduction
Handwritten signatures have been used in day-to-day interactions for centuries. However, growing reliance on remote communications as well as usage of new technical devices have made lawmakers and regulators introduce equivalents of handwritten signatures that can be used in non-face-to-face environment.
This has led to the introduction of electronic signature (e-signature) regulation. The tables have turned, for while the handwritten signature has never been regulated in much detail, the e-signature regulation is almost a separate universe with its own regulatory framework that has often very specific and impenetrable technical standards. This is partly why some jurisdictions are still struggling to implement relevant regulations, as this is certainly a case where one size does not fit all. Meanwhile, market players are finding themselves between a rock and a hard place, being either under significant regulatory pressure (which may jeopardize the growth of online businesses) or having no regulatory protection at all (piling up risks in the system and eventually jeopardizing consumer trust).
The goal of this article is to formulate proposals for regulatory bodies whose implementation would ensure the effective introduction into civil circulation of electronic signatures, with minimal costs for economic entities. To achieve this goal, a comparative analysis of handwritten and electronic signatures, the functions of different types of signatures, as well as their practical application in certain situations was carried out. This goal suggested the following main research questions:
What are the common functions of the handwritten and electronic signatures?
What characteristics of electronic signatures should be functionally equivalent to handwritten signatures?
What approaches are relevant for policy makers and private actors to ensure the functional equivalence of electronic and handwritten signatures?
We build upon the notion of functional symmetry that implies, as put by Savin [
1], that ‘like should be regulated alike’ (i.e., similar functions shall entail similar regulatory requirements). Following Veerpalu’s research on functional symmetry [
2], we claim that to ensure actual equivalence, a signature needs to be seen as a set of procedures rather that an instrument.
We apply the principle of functional symmetry to handwritten and electronic signatures to verify the appropriate regulatory approach. Our analysis shows that instead of functional symmetry, current regulatory framework tends to be more instrument-specific and this is potentially detrimental to e-signature usage by businesses and, in particular, individuals (due to over-regulation). Outcome-based regulation, on the other hand, can be a more efficient alternative to instrument-specific approaches. We suggest that ‘deconstructing’ the concept of the signature may allow for more precise risk assessment and the saving of resources by using cheaper alternatives to qualified electronic signatures that require complicated regulatory framework and expensive infrastructure. Otherwise, there is a risk of falling into a ‘digitization trap’ whereby the attempt at digitizing inefficient processes leads to digitizing efficiency, rather than minimizing it.
There is a somewhat patchy coverage of signatures (both electronic and handwritten) in academic literature. The legal concept of handwritten signatures has been well discussed through in-depth analysis by Stephen Mason [
3] which covered both the legal and historical aspects of this phenomenon. Lon L. Fuller [
4] has contributed significantly to the understanding of the handwritten signature in an oft-cited work on the functions of legal formalities. Yet, the handwritten signature itself is mostly discussed in the context of forensic examination: for example, using pattern recognition technologies [
5], neural identification of a signature [
6], biometric identification [
7], using deep convolutional neural networks [
8], etc. There has been wider discussion surrounding electronic signatures, however, most of these authors look at the e-signature more as a technology rather than as a ‘signature’. Applied aspects in mobile-based e-signatures [
9], using electronic watermarks [
10] are good examples of such technology-focused research. Implementation of electronic signature legislation has also spurred multiple papers on local regulatory approaches, e.g., for Hungary [
11], China [
12], the United States [
13], and the European Union including comparative analysis [
14].
Another body of research is dedicated to those electronic contracts which are intrinsically related to signatures [
15], as well as the act of ‘signing’, and mostly cover consumer protection issues: for example, material clauses disclosure [
16,
17], usage of standard electronic contracts and contracts on consuming digital content [
18]. However, despite a seemingly wide coverage of electronic signatures in academic literature, there are still gaps in understanding of the similarities and differences between electronic and handwritten signatures, the functional specifics of their relationship and the role of the electronic signature for electronic contract.
The research problem is that, in fact, the electronic signature has been implemented in the business processes of various organizations on a global scale. Different countries use different technologies to implement the electronic signature technology. However, studies related to the extent to which various technologies of “electronic signatures” correspond “in terms of strength” to handwritten counterparts in various fields of activity are practically absent. The complexity of this assessment is due to the fact that it is multifaceted, since it must be analyzed by various specialists, from lawyers and economists to IT specialists and mathematicians. Such problems can be solved with the help of expert evaluation methods; our article is therefore devoted to these issues.
This article aims to identify a relevant approach to ensure the functional symmetry of electronic and handwritten signatures in terms of digital transformations. From a methodological perspective, Veerpalu’s [
2] research provides the valuable rationale to develop functional regulation for the innovative processes and services. Therefore, the research methodology is based on a comparative analysis of the existing handwritten and electronic signature regulation and synthesis of the outcome-focused approaches to achieving similar results in similar circumstances of online lending.
The article is structured as follows. First, we look at the concept of the handwritten signature and academic perspectives to identifying its functions. Then, we provide a brief overview of regulatory approaches to electronic signatures and symmetrically transpose the main functions of the handwritten signature to the e-signature. In the empirical section, we describe the case of electronic contracts between borrower and lender in online lending services to identify the procedures that may strengthen reliability of online interaction between these two parties. Finally, we outline conceptual conclusions and identify policy implications and recommendations for the public and private actors. The areas for further research are discussed as well.
2. Rationale for the Research Methodology
2.1. The Handwritten Signature and Its Functions
Although handwritten signatures play a pivotal role in business, and despite their ubiquitous usage, legal definitions of the handwritten signature are scarce. In his excellent analysis, Mason [
3] cites multiple definitions of a handwritten signature. In Russian legal practice, the handwritten (or personal) signature is a set of symbols inscribed by hand with the purpose of identifying a person (See: (1) Appeal ruling of Leningrad regional court of 11.09.2019 in case No. 33-5452/2019; (2) decision of the Kalininsky district court of Chelyabinsk of 09.10.2018 in case No. 2-3245/2018; (3) Appeal ruling of Krasnodar regional court of 29.05.2018 in case No. 33-13084/2018; (4) decision of Armenian city court of the Republic of Crimea of 04.04.2017 in case № 2-1/2017(2-370/2016;)~M-329/2016; (5) decision of Chertanovsky district court of Moscow of 09.09.2016 in case No. 2-4890/2016; (6) Absentee decision of the Vasileostrovsky district court of Saint Petersburg dated 16.05.2016 in case No. 2- 168/2016 (2-5045/2015;)~M-4869/15; (7) decision of Rudnichny district court of city Prokopyevsk of 03.12.2015 in case No. 2-1769/2015)). Hays [
19] refers to the United States Uniform Commercial Code which defines a signature as ‘any symbol executed or adopted by a party with present intention to authenticate a writing’. If read altogether, all definitions of handwritten signatures boil down to a popular meaning: this is a sign of authenticity upon a durable medium that may be based on the name of the signatory.
Notably, the indication of the name is not the defining feature of the signature. Both popular and legal meanings of a signature are technology-neutral. There is significant variability in how a handwritten signature can be effected:
- (a)
in terms of medium: signature can be affixed either on a paper sheet, wood, napkin or anywhere else;
- (b)
in form: either ‘name in cursive’, name in block capitals, initials, a cross, a ‘tick’ or inked fingerprint;
- (c)
by the ‘instrument’: technically, a wet signature might be affixed by pen, pencil, a knife (e.g., for carving), not only by hand by also by keeping a pen in mouth (which is relevant for incapacitated persons).
Medium, form or instrument reflect the ‘instrumental’ approach to defining the handwritten signature. This is different from the ‘functional’ approach which is focused on the functions of a signature (
Table 1) and can be applied to symmetrically integrating electronic ones.
We reveal that previous systems of functions do not address the question of reliability. The reliability of the handwritten signature is guaranteed by business practices, not legal requirements. This, in our opinion, is fundamental in correspondence to innovations related to the introduction of an electronic signature and defines the most significant functions to study.
Identification (We use the term ‘identification’ instead of ‘authentication’ (used by Reed [
20], Mason [
3] and Fuller [
4]) as it covers both ex-ante and ex post scenarios). The signature shall be linked to the signatory and provide protection against impersonation or backtracking. There can be ex ante identification (i.e., when a signature confirms the identity at the time of affixation) and ex post identification (i.e., when a signature is used as forensic evidence to subsequently establish or confirm the identity of the signatory).
Expression of intent. The opposite party needs assurance that the signatory expressed intent to be bound by the contract and this expression of will is admissible evidence in case of dispute (including redress in court). It is important to note that there is a difference between an understanding of the contents of a contract and intent to sign it. There are customers who may understand the contract and not sign it and customers who sign a contract without really understanding its contents.
Inalterability. The signatory affixes the document, making sure that the original that is kept with the opposite party will not be altered.
Evidential. Signed document might be used as evidence in case of disputes (including legal redress).
While cautionary and ex ante identification functions are relevant in the moment of affixing a signature, expression of intent, inalterability, ex post identification and evidential functions provide ex post protection. As seen from previous research, functions of a handwritten signature can be classified as ‘inward’ and ‘outward’. ‘Inward’ functions are aimed at the signatory and would ceteris paribus address a cautionary function. As mentioned above, awareness would depend a lot on the characteristics of the signatory himself/herself, as well as the particular circumstances. Other functions of the handwritten signature are mostly focused ‘outwards’, benefiting those parties different from the signatory (e.g., protecting from the signatory backtracking). It is important to note that, again, in different circumstances the efficiency of these functions may vary significantly.
2.2. Types of Electronic Signatures
A technical overview of the electronic signature goes beyond the scope of this research. Yet, it is important to note that there are multiple modalities of how e-signatures might work. Unlike handwritten signatures, electronic signatures that are based on cryptographic mechanisms sign the unique hash-function of the electronic document, instead of the document itself. This ensures inalterability, as any meddling with the document might be detected. However, simpler signatures (such as one-time-passwords) may not be directly related to the document itself and represent only randomly generated codes or codes generated based on the date/time.
Lawmakers usually adopt the tiered approach to e-signature regulation. As shown above, this is quite different from virtually non-existent handwritten signature regulation. For example, eIDAS Regulation in the European Union instates the following types of electronic signatures:
- (a)
electronic signature (also dubbed in practice as ‘simple electronic signature’);
- (b)
advanced electronic signature;
- (c)
qualified electronic signature.
In practical terms, the simple electronic signature (SES) is the instrument with the lowest assurance level.
In general, SES itself references the signatory but does not necessarily authenticate a signatory person itself. Therefore, it is similar to the handwritten signature—quite vague in form, with the appropriateness of SES being defined by circumstances. Yet, as can be derived from the E-Sign definition, SES might provide evidence of intent. For example, per legal practice, automated signatures in email footers might be considered enforceable SES, if conditions of intent are met (Neocleous & Anor v Rees [2019] EWHC 2462 (Ch) (20 September 2019), available at:
http://www.bailii.org/ew/cases/EWHC/Ch/2019/2462.html (accessed on 12 January 2022)). Despite the almost ubiquitous usage, SES have been mostly neglected in academic literature: possibly, because of the lower assurance level. In particular, Bell et al. [
14] outright brushes the SES off the table (in our opinion, unfairly): ‘everyone is better off using the ‘advanced’ signatures’.
Regulation also does not seem to favor simple electronic signatures: the characteristics of advanced electronic signature (AES) are more clearly defined.
AES requirements are very peculiar from a theoretical perspective. Linkage to the signatory, the identification and control over signature creation data mirror those of the handwritten signature and fall under the ‘identification’ function (namely, each signature shall be unique to the individual who can use it). ‘Detectable data change’ is an ‘inalterability’ function as AES generally fulfills all the functions of a handwritten signature. This leaves limited room for qualified electronic signatures. It is noteworthy to consider the advantages of the latter implying functional symmetry (
Table 2).
Qualified electronic signatures (QES) have the same characteristics as AES but shall be created by a ‘qualified electronic signature creation device’ (as per eIDAS) and be based on a qualified certificate for electronic signatures. Qualified electronic certificates are issued by the qualified service providers which are subject to specific requirements and effectively act as trusted third parties. In other words, QES goes beyond the functions of a handwritten signature. Unlike the latter, it is issued by an independent party that the other parties rely on for ex ante identification.
Although the nomenclature seems very clear (from the least reliable to the most reliable e-signature), in effect the lines are very blurred. Multiple sources (Signicat, NautaDutilh, Cryptomathic) imply that QES is the only functionally symmetrical equivalent of the handwritten signature. Actually, this is not quite true. The EIDAS regulation states that a qualified electronic signature shall have the equivalent legal effect of a handwritten signature (Article 25(2)). Yet, the recital 49 goes on to explain that ‘it is for national law to define the legal effect of electronic signatures’. In other words, both SES and AES can be functionally symmetrical equivalents of a handwritten signature as well. The only question is where and how. Adding to this collision is the fact that lawmakers require a specific type of e-signature in some circumstances. For example, in Russia SES cannot be used for electronic exchange related to state secrets (See: paragraph 4 of art. 9 of Federal Law No. 63-FZ of April 6, 2011 ‘On electronic signature’). The practice varies in the European Union as well (For an excellent breakdown of e-signature requirements in different countries see
https://www.cliffordchance.com/content/dam/cliffordchance/briefings/2020/03/coronavirus-electronic-signatures-when-can-these-be-used-a-global-perspective.pdf (accessed on 15 May 2022)).
To put it simply, electronic signatures are confusing as a result of overregulation aimed at solving multiple problems at once. In particular, although AES generally fills the shoes of the handwritten signature, the regulatory gravitation towards QES is explained by the fact that a qualified electronic signature provides an ex ante identification function which the handwritten signature does not have. QES is lucrative to regulators because it implies reliance on the third party: unlike handwritten signature, QES is ‘issued’ to the person. Yet, most policies aimed at substituting handwritten signatures with QES are likely to fail, as, unlike handwritten signature, QES usage is conditional—the customer needs to go through identification by a trust service provider (TSP). TSP services cost money, the certificates have expiration dates and QES often requires usage of the specific signature creation device (such as token). Therefore, despite mandated ‘legal equivalence’, QES is certainly far from being a functionally symmetrical substitute of a handwritten signature in practical terms—it is more reliable yet more complicated to use. Gravitation towards QES might also be attributed to the marketing activities of trust service providers for which QES issuance and usage is a source of income.
We believe that this confusion and potential over-regulation might be solved by employing functional symmetry approach. This approach implies that a set of procedures are used to achieve the desired outcomes between certain institutional units based on signature functions that makes it possible to apply functional symmetry between different types of signatures in a fuzzy and exact form.
2.3. Mathematical Models for Expert Opinions Processing
Under a high degree of uncertainty inherent to socio-economic processes, approaches are effectively based on the following theories: probability theory, possibility theory and fuzzy set theory.
Causal relationships between factors can be described by probabilistic–statistical, fuzzy and expert methods, as well as their combinations.
One of the most common methods for expert assessment of the causality of relationships are methods that allow for the evaluation of various coefficients of causal relationships between factors: DEMATEL, MICMAC.
The Decision Making Trial and Evaluation Laboratory (DEMATEL) method [
21,
22] is a multi-criteria decision-making method that implies the efficient identification of causal relationships of a complex system based on aggregation of expert assessments. This method aggregates a collective expert opinion in order to exclude random relationships between indicators and criteria, and to identify the most important indicators that determine some integral characteristic based on causal relationships.
The Matrix d’Impacts Croises Multiplication Appliqué un Classement (MICMAC) method [
23] is a procedure for constructing a classification matrix of factors cross-influence that aims to assess the degree of dependence of the influence of variables based on ranking. All factors belong to one of four clusters: autonomous, dependent, interconnected and independent. These factors are grouped on the basis of a potential and strength of influence. Autonomous factors are factors that have a weak potential and power of influence. Dependent factors are factors that have low potential but strong influence. Interconnected factors are factors that have a high potential and power of influence. These factors are causally related, that is, an action on one of them will lead to a change in the other. Independent factors are factors that have strong potential but little influence. All factors are plotted on a graph with four clusters, where the potential of the variable is on the
Y-axis, and the strength of influence is on the
X-axis [
24].
Another effective approach for expert opinions processing is an expert survey model based on the theory of fuzzy sets. According to the theory of fuzzy sets, objects may have different degrees of membership to different sets, and the measure of this fuzziness is a parameter for evaluating the quality of various procedures and algorithms in pattern recognition, decision-making, information retrieval models, etc.
3. Expert Assessment of the Functional Correspondence between Electronic Signatures and Handwritten Signatures
An expert assessment of the functional correspondence of handwritten and electronic signatures can be implemented using fuzzy set theory. The advantage of this approach is that fuzzy logic is not binary, and therefore implies a non-mutually exclusive nature of the concepts of “true” and “false”.
Models based on fuzzy sets have a number of basic differences from traditional models that allow them to achieve a certain competitive advantage:
the use of fuzzy numbers (a number of parameters in any models cannot be set unambiguously: expert opinions, results of marketing surveys, etc.);
formalization of natural language words using the apparatus of linguistic variables: “better”, “worse”, “possibly”, etc.;
conducting qualitative assessments of the initial data and results in terms of their reliability, taking into account the interpretation of natural language words;
modeling complex economic processes and systems with a given degree of accuracy based on fuzzy logic methods (the researcher does not spend much time finding out the exact values of variables and compiling regression equations).
To build fuzzy models for an evaluation of the symmetry of electronic and handwritten signatures, the previously defined compliance criteria will be used:
identification function (IF);
expression of intent (EI);
inalterability function (FC);
evidential function (EP).
Let’s define three fuzzy sets:
HS—functional symmetry of handwritten signature to itself;
SES—functional symmetry of SES to handwritten signature;
QES—functional symmetry of QES to handwritten signature.
According to the theory of fuzzy sets, for each set a universal set and a membership function must be given.
In our case, the universal set will be specified by the criteria of functional correspondence:
Fuzzy set QES:
where
represent membership functions of the fuzzy sets HS, SES and QES, respectively.
In our research, we propose to evaluate the degree of functional symmetry of an electronic signature of two types and a handwritten signature based on the calculation of the distance between fuzzy sets.
One approach to determining the distance between fuzzy sets uses the Hamming relative distance formula:
where:
n represents the number of elements of fuzzy set and represent the membership functions of the compared fuzzy sets HS and SES, respectively.
Let us consider the following expert estimates (
Table 3).
The distance between fuzzy sets which characterized the functional symmetry of SES and HS based on Hamming relative distance (Formula (5)) is 0.61, and between QES and HS is 0.4. Thus, the QES fuzzy set is closer to HS and functional symmetry between QES and handwritten signatures is higher.
One another important area where the elements of the theory of fuzzy sets are productively applied is the construction of fuzzy control systems. Fuzzy control systems allow the use of the main sources of information about the control object:
Basic components of the architecture of the fuzzy control system are: fuzzification block, base of fuzzy rules, fuzzy inference algorithm, defuzzification block.
Our research aims to build a fuzzy control model for estimating an integral indicator of the signatory equivalence between different types of electronic signatures and handwritten signature.
The main criteria of functional symmetry of signatures are the same:
identification function;
expression of intent;
inalterability function;
evidential function.
Therefore, our supposed experts suggest the following parameters for a Mamdani type fuzzy inference system (
Table 4).
To form the basis of fuzzy rules, experts can formulate vague statements in form, such as the one shown below:
An example of fuzzy rule:
IF | Identification function symmetry | middle |
AND | Expression of intent symmetry | middle |
AND | Inalterability function symmetry | low |
AND | Evidential function symmetry | low |
THEN | Signatory equivalence | middle |
The maximum number of the rules within above mentioned fuzzy expert system is 243, but in practice the rules base can be decreased and consist of a much smaller number of rules, due to excluding rare or obviously unrealistic combinations of the values of input factors and dependent variable [
25].
The main stages of a Mamdani type fuzzy inference system algorithm are the following (considering rules in Formula (6) as an example):
Stage 1. Fuzzification (or introduction of fuzziness) of input variables: according to the actual exact values of the input variables ,, where are universal sets of input linguistic variables , degrees of truth are determined for the premises of each rule , , ,.
Stage 2. Fuzzy inference, consisting of two actions—aggregation of premises and activation of rule conclusions. Firstly, the degrees of truth (power) of the rules (
) are found, in the case of our model using the min operation, since the logical connectives “AND” are used:
Then “truncated” membership functions for rule conclusions are defined:
where:
—universal set of output variable .
Stage 3. Accumulation of conclusions of fuzzy rules. “Truncated” functions are combined, and as a result constructed final fuzzy set for the output variable with a membership function:
Stage 4. Defuzzification. Finding an equivalent to the generated fuzzy set for the output variable
in exact form using one of the following methods: center of gravity method, area center method, first or last maximum. In our case we used center of gravity method:
Using software environment Matlab and its application Fuzzy Logic Toolbox to construct fuzzy system, it is possible to evaluate the level of equivalence between handwritten and electronic signatures. For example, if the experts evaluated the levels of signatory equivalence between two types of electronic signatures (SES and QES) and handwritten signature for each criterion, presented in
Table 3, then the integral indicator of the signatory equivalence will be in crisp form for SES—0.36, for QES—0.53.
The fuzzy sets which correspond to integral equivalence between SES, QES and handwritten signature obtained from the fuzzy inference system are presented in
Figure 1.
As an obtained result, the functional symmetry between SES and handwritten signatures is higher than between QES and handwritten. The similar modelling may be applied for other types of electronic signatures.
In the next section, we discuss the practical case of online lending through the lens of a functional symmetry approach.
5. Conclusions
5.1. Conceptual Considerations
Nearly ubiquitous usage of electronic agreements has fueled the discussion about electronic signatures. As a result, many jurisdictions have created robust e-signature regulatory frameworks. These initiatives have been focused on the implied symmetry of the signatory function: documents signed with an electronic signature shall have the same power as documents signed with a handwritten signature. Yet, functional symmetry assumes that we know the left side of the equation (i.e., what handwritten signature is and what functions it has). However, there seems to be extremely limited research on this. This has led to the following implications. First, regulators have started to focus on assurance levels and creating private key infrastructure which, as our analysis shows, is not always required to ensure functional symmetry. Secondly, e-signature regulation seems to be falling into a ‘digitization’ trap where traditional processes and procedures are digitized by default—without examining whether these initial precedents were efficient. This approach mirrors that of Veerpalu’s [
2] where functional symmetry and corresponding signatory equivalence is judged by the ability to achieve a similar outcome, albeit through different processes.
Our research suggests two conceptual considerations that have reflected the objectives of our research. First, we suggest that the signature shall be viewed not as an act but rather as a set of procedures associated with affixing the signature itself. Correspondingly, ‘deconstructing’ the signature in a set of procedures might inform efficient policy and business decisions to symmetrically integrate electronic signatories. Secondly, our research shows the importance of a functional symmetry approach to policy making in the realm of electronic signatures. We suggest that the efficiency of electronic signature regulation is assessed based not on the assurance levels or type of e-signature but on whether participants of legal relations have achieved the desired functions in a way that is symmetrical to a handwritten signature (i.e., ex ante identification, expression of intent, inalterability and creation of reliable evidence).
The assessment of the functional symmetry of handwritten and electronic signatures is a poorly formalized task, which requires the involvement of experts who must express their opinion. An effective approach to formalizing and processing expert opinions is the use of mathematical models based on the theory of fuzzy sets. The approaches proposed in this paper, based on measuring the distance between fuzzy sets and the Mamdani fuzzy inference algorithm, make it possible to form an estimate of the degree of functional symmetry between different types of signatures in a fuzzy and exact form. For example, numerical experiments have shown that QES has a higher level of symmetry with respect to a handwritten signature than SES.
5.2. Policy Implications
Based on our research, the following policy recommendations might be useful to achieve sufficient functional symmetry of handwritten and electronic signatures in a financial services sector (and other sectors as well, considering the specificity), irrespective of what type of e-signature is used.
For ex ante identification, regulators need to implement multiple options for non-face-to-face identification and confirmation of identity, as far as they are in line with the FATF recommendations and correspond to ML/TF risks. These options may not necessarily include usage of e-signatures.
To ensure proper capture of intent, regulators need to focus on implementing or recommending best practices regarding the process of signing electronic documents, to ensure capture of intent is retained irrespective of what type of e-signature is used. This implies specific, informed and unambiguous intent in the form of affirmative action. This might be supported by identification of malpractices aimed at confusing customers and pressuring them to unwillingly agree to contract terms.
To minimize information asymmetry, it is advisable to implement a two-tiered approach to the disclosure of material clauses in electronic agreements (e.g., by introducing key information documents) for improved readability of contracts for consumers, irrespective of what type of e-signature is used.
For the purpose of inalterability, the financial institutions might be required either to deposit authoritative copies of the electronic contract with a trusted third party (depositary) or send the digitally signed authoritative copy to the customer. Another option is to publish scanned and digitally signed copies of paper framework contracts on the financial institution website. The actors need to be mindful of the risks and costs associated with each of these options.
Regulations need to identify the scope of material clauses of framework contracts that cannot be changed unilaterally to the applying e-signatory (or without obtaining active affirmative action-based consent from the consumer).
Financial institutions need to ensure maintenance of an audit trail that would constitute admissible evidence, irrespective of the type of e-signature used by the consumer. Apart from transactional history, this audit trail needs to prove that all signature functions are implemented correctly (the identity of the consumer is verified, as per regulations, the consumer entered the contract willingly and knowingly, contract terms have not been amended unbeknownst to the customer). To ensure credibility of the audit trail, which is one of the key conditions for accepting it as reliable evidence, it is also possible to address a trusted third party. Long-term preservation of electronic documents signed with e-signatures is moving from passive data storage towards active operations aiming to ensure the availability and authenticity of electronic documents. As a result, the role of professional participants in this field is expected to grow.
These recommendations apply not only to the financial sector but also to any businesses that operate online, depending on level of risk. For example, food delivery services are not subject to AML/CFT requirements, therefore verification of identity does not require high level of assurance; yet the expression of intent might be relevant for them.
5.3. Further Research
The analytical framework developed in this research might be further improved by cross-country comparative analysis of e-signature implementation and correlation between regulatory approaches and actual application of e-signatures by the public. From our point of view, further research is needed in the context of the main areas of application of electronic signatures, including the spheres of activity of the public administration sector, corporations, non-profit organizations serving households, and relations with non-residents. For these new cases, the proposed functional symmetry approach can be combined with a fuzziness index analysis (as was shown above) that provide new prospects for further expert research.
In the context of the financial services sector, an electronic signature is in demand not only for the provision of these services by businesses to households, but also in a wide range of financial relations involving consumers, business and the state. Another important issue that might need to be reviewed is the risks of electronic signatures related to protecting personal data. We also believe that there is a need for more cross-disciplinary research that includes behavioral aspects, information security and AML/CFT considerations in devising best practices for the integration of electronic signature technology in different sectors of the economy.