E-Signature Glossary: 50+ Terms Explained (2026)

Your Complete E-Signature Reference

Navigate the world of electronic signatures with our comprehensive glossary. From ESIGN Act to PKI, audit trails to certificate authorities - find clear definitions for every e-signature term you encounter.

Quick links: Jump to terms by letter using the navigation below, or use Ctrl/Cmd+F to search.

A

Audit Trail

A chronological record of all document actions including creation, viewing, signing, and modifications. Includes timestamps, IP addresses, and user identification. Essential for legal compliance.

Legal

Authentication

The process of verifying a signer's identity before allowing them to sign. Methods include email verification, SMS codes, knowledge-based questions, and government ID checks.

Security

Advanced Electronic Signature (AES)

Under eIDAS (EU), a signature uniquely linked to the signatory, capable of identifying them, created with high-level security, and linked to the signed data to detect changes.

Legal

B

Biometric Signature

A signature captured using biometric data such as fingerprint patterns, typing rhythm, or stylus pressure. Provides additional identity verification.

Technology

Bulk Send

The ability to send the same document template to multiple recipients at once. Each recipient signs their own copy independently.

Feature

C

Certificate Authority (CA)

A trusted organization that issues digital certificates. The CA verifies the identity of certificate holders and vouches for their authenticity.

Technology

Certificate of Completion

A document summarizing the e-signature transaction with signer details, timestamps, IP addresses, and verification methods. Serves as legal proof.

Legal

Clickwrap Agreement

An agreement where users indicate consent by clicking a button (e.g., "I Agree"). Commonly used for terms of service and software licenses.

Legal

D

Digital Certificate

An electronic credential issued by a Certificate Authority that binds a public key to an identity. Used to verify digital signatures.

Technology

Digital Signature

A type of electronic signature using PKI cryptography. Creates an encrypted fingerprint unique to both the signer and document. Provides non-repudiation.

Technology

Document Hash

A unique fingerprint generated from document contents using a cryptographic algorithm. Any change to the document changes the hash, enabling tamper detection.

Technology

E

eIDAS

Electronic Identification, Authentication and Trust Services - EU regulation establishing standards for electronic signatures, seals, timestamps, and documents across EU member states.

Legal

Electronic Record

Any information stored in electronic format. Under ESIGN and UETA, electronic records have the same legal effect as paper records.

Legal

Electronic Signature (E-Signature)

Any electronic sound, symbol, or process attached to or logically associated with a contract indicating intent to sign. Includes typed names, clicks, and drawn signatures.

Core

Envelope

A container for documents being sent for signature. May include multiple documents, recipients, and routing rules. Term used by DocuSign.

Feature

ESIGN Act

Electronic Signatures in Global and National Commerce Act (2000). US federal law establishing that electronic signatures cannot be denied legal effect solely because they are electronic.

Legal

F

Field

A designated area on a document where a signer enters information. Types include signature, initial, date, text, checkbox, and dropdown fields.

Feature

FedRAMP

Federal Risk and Authorization Management Program. US government security certification for cloud services. Required for federal agency e-signature solutions.

Compliance

G

GPEA

Government Paperwork Elimination Act (1998). US law requiring federal agencies to provide electronic alternatives for document submissions and signatures.

Legal

H

Hash Algorithm

A mathematical function that converts data into a fixed-size string (hash). Common algorithms include SHA-256. Used for document integrity verification.

Technology

HIPAA

Health Insurance Portability and Accountability Act. US law protecting health information. E-signature providers handling PHI must sign Business Associate Agreements.

Compliance

I

Identity Proofing

The process of verifying a person's identity before issuing credentials or allowing high-value transactions. May include ID document verification.

Security

In-Person Signing

A signing session where the signer is physically present with the document sender or a witness, often using a shared device.

Feature

Intent to Sign

The signer's clear indication they intend to be legally bound by the document. Demonstrated through explicit actions like clicking "Sign" or drawing a signature.

Legal

K

Knowledge-Based Authentication (KBA)

Identity verification using questions only the signer should know, often drawn from credit bureau or public records (e.g., "What street did you live on in 2015?").

Security

L

Long-Term Validation (LTV)

Technology ensuring digital signatures remain verifiable long after signing, even if certificates expire. Embeds validation data within the signed document.

Technology

M

Multi-Factor Authentication (MFA)

Security requiring two or more verification methods: something you know (password), have (phone), or are (biometric).

Security

Multi-Signer

A document requiring signatures from multiple parties. Can be configured for sequential (ordered) or parallel (any order) signing.

Feature

N

Non-Repudiation

The assurance that a signer cannot deny having signed a document. Achieved through cryptographic proof (digital signatures) or comprehensive audit trails (e-signatures).

Legal

Notarization

A process where a notary public verifies signer identity and witnesses the signature. Separate from e-signature but can be combined via Remote Online Notarization (RON).

Legal

P

PKI (Public Key Infrastructure)

A system of cryptographic keys, certificates, and Certificate Authorities enabling secure digital signatures and encryption. Foundation of digital signature technology.

Technology

Private Key

A secret cryptographic key known only to the signer. Used to create digital signatures. Must be kept secure to maintain signature validity.

Technology

Public Key

A cryptographic key that can be shared publicly. Used by others to verify digital signatures created with the corresponding private key.

Technology

Q

Qualified Electronic Signature (QES)

Under eIDAS (EU), the highest level of e-signature. Created with a qualified certificate and signature creation device. Equivalent to handwritten signature in all EU states.

Legal

R

Recipient

A person designated to receive, view, or sign a document. Recipients may be signers, carbon copy (CC), or in-person signers.

Feature

Remote Online Notarization (RON)

The process of notarizing documents via video conference rather than in-person. Signer and notary connect online for identity verification and witnessing.

Legal

Routing Order

The sequence in which multiple signers receive and sign a document. Can be sequential (one after another) or parallel (all at once).

Feature

S

Seal

An electronic seal used by organizations (rather than individuals) to guarantee document origin and integrity. Common in EU under eIDAS.

Legal

Signature Adoption

The act of a signer choosing and accepting their signature representation (typed, drawn, or uploaded) for use on documents.

Feature

Signing Order

The specified sequence in which recipients must sign a document. Used for workflows where one signature must precede another.

Feature

SOC 2

Service Organization Control 2. An auditing standard evaluating data security practices. SOC 2 Type II certification indicates ongoing security compliance.

Compliance

T

Tamper-Evident Seal

Technology that detects any changes to a signed document after signing. If the document is modified, the seal shows it has been tampered with.

Technology

Template

A reusable document with pre-placed signature and form fields. Allows sending the same document structure to multiple recipients without recreating fields.

Feature

Timestamp

A record of the exact date and time an action occurred (signing, viewing, etc.). Often includes timezone and is provided by a trusted time source.

Legal

Trusted Timestamp

A timestamp issued by a trusted third-party Timestamp Authority (TSA). Provides independent verification of when a signature occurred.

Technology

U

UETA

Uniform Electronic Transactions Act (1999). A model law adopted by 47 US states establishing legal equivalence of electronic and paper records/signatures.

Legal

W

Wet Signature

A traditional handwritten signature made with pen on paper. Called "wet" because of the wet ink. Still required for certain legal documents.

Core

Witness

A person who observes a signature being made but does not sign the document themselves. Some documents require witnesses for legal validity.

Legal

X

X.509 Certificate

The standard format for public key certificates used in PKI. Contains the public key, identity information, and CA signature.

Technology

Key Acronyms Quick Reference

AcronymFull NameQuick Definition
ESIGNElectronic Signatures in Global and National Commerce ActUS federal law making e-signatures legal
UETAUniform Electronic Transactions ActState-level e-signature law (47 states)
eIDASElectronic Identification, Authentication and Trust ServicesEU regulation for e-signatures
PKIPublic Key InfrastructureCryptographic system for digital signatures
CACertificate AuthorityTrusted issuer of digital certificates
KBAKnowledge-Based AuthenticationIdentity verification via personal questions
RONRemote Online NotarizationNotarization via video conference
MFAMulti-Factor AuthenticationSecurity using multiple verification methods
AESAdvanced Electronic SignatureeIDAS signature with enhanced security
QESQualified Electronic SignatureHighest eIDAS signature level

Frequently Asked Questions

What is the difference between e-signature and digital signature?

An e-signature (electronic signature) is any electronic mark indicating agreement - typed names, clicks, drawn signatures. A digital signature is a specific type using PKI cryptography to create an encrypted fingerprint. All digital signatures are e-signatures, but not all e-signatures are digital signatures.

What does ESIGN stand for?

ESIGN stands for the Electronic Signatures in Global and National Commerce Act, a US federal law passed in 2000 that grants electronic signatures the same legal validity as handwritten signatures.

What is an audit trail in e-signatures?

An audit trail is a chronological record of all actions taken on a document: when it was created, sent, viewed, signed, and by whom. It includes timestamps, IP addresses, and authentication methods. Audit trails provide legal evidence of the signing process.

What is PKI in digital signatures?

PKI (Public Key Infrastructure) is a cryptographic system using paired public and private keys to create and verify digital signatures. The signer uses their private key to create a unique signature, which anyone can verify using the corresponding public key.

What is a certificate of completion?

A certificate of completion (or signing certificate) is a document summarizing the e-signature transaction. It typically includes: signer names, email addresses, signature timestamps, IP addresses, authentication methods, and document hash. It serves as legal proof of signing.

What is the meaning of non-repudiation?

Non-repudiation means a signer cannot deny having signed a document. Digital signatures achieve this through cryptographic proof. E-signatures achieve it through audit trails, identity verification, and tamper detection.

Ready to Put These Terms Into Practice?

Start sending legally binding e-signatures in minutes.

Start 15-Day Free Trial

No credit card required - ESIGN & UETA compliant

Related Comparisons