E-Signature Glossary: 50+ Terms Explained (2026)
Your Complete E-Signature Reference
Navigate the world of electronic signatures with our comprehensive glossary. From ESIGN Act to PKI, audit trails to certificate authorities - find clear definitions for every e-signature term you encounter.
Quick links: Jump to terms by letter using the navigation below, or use Ctrl/Cmd+F to search.
A
Audit Trail
A chronological record of all document actions including creation, viewing, signing, and modifications. Includes timestamps, IP addresses, and user identification. Essential for legal compliance.
Authentication
The process of verifying a signer's identity before allowing them to sign. Methods include email verification, SMS codes, knowledge-based questions, and government ID checks.
Advanced Electronic Signature (AES)
Under eIDAS (EU), a signature uniquely linked to the signatory, capable of identifying them, created with high-level security, and linked to the signed data to detect changes.
B
Biometric Signature
A signature captured using biometric data such as fingerprint patterns, typing rhythm, or stylus pressure. Provides additional identity verification.
Bulk Send
The ability to send the same document template to multiple recipients at once. Each recipient signs their own copy independently.
C
Certificate Authority (CA)
A trusted organization that issues digital certificates. The CA verifies the identity of certificate holders and vouches for their authenticity.
Certificate of Completion
A document summarizing the e-signature transaction with signer details, timestamps, IP addresses, and verification methods. Serves as legal proof.
Clickwrap Agreement
An agreement where users indicate consent by clicking a button (e.g., "I Agree"). Commonly used for terms of service and software licenses.
D
Digital Certificate
An electronic credential issued by a Certificate Authority that binds a public key to an identity. Used to verify digital signatures.
Digital Signature
A type of electronic signature using PKI cryptography. Creates an encrypted fingerprint unique to both the signer and document. Provides non-repudiation.
Document Hash
A unique fingerprint generated from document contents using a cryptographic algorithm. Any change to the document changes the hash, enabling tamper detection.
E
eIDAS
Electronic Identification, Authentication and Trust Services - EU regulation establishing standards for electronic signatures, seals, timestamps, and documents across EU member states.
Electronic Record
Any information stored in electronic format. Under ESIGN and UETA, electronic records have the same legal effect as paper records.
Electronic Signature (E-Signature)
Any electronic sound, symbol, or process attached to or logically associated with a contract indicating intent to sign. Includes typed names, clicks, and drawn signatures.
Envelope
A container for documents being sent for signature. May include multiple documents, recipients, and routing rules. Term used by DocuSign.
ESIGN Act
Electronic Signatures in Global and National Commerce Act (2000). US federal law establishing that electronic signatures cannot be denied legal effect solely because they are electronic.
F
Field
A designated area on a document where a signer enters information. Types include signature, initial, date, text, checkbox, and dropdown fields.
FedRAMP
Federal Risk and Authorization Management Program. US government security certification for cloud services. Required for federal agency e-signature solutions.
G
GPEA
Government Paperwork Elimination Act (1998). US law requiring federal agencies to provide electronic alternatives for document submissions and signatures.
H
Hash Algorithm
A mathematical function that converts data into a fixed-size string (hash). Common algorithms include SHA-256. Used for document integrity verification.
HIPAA
Health Insurance Portability and Accountability Act. US law protecting health information. E-signature providers handling PHI must sign Business Associate Agreements.
I
Identity Proofing
The process of verifying a person's identity before issuing credentials or allowing high-value transactions. May include ID document verification.
In-Person Signing
A signing session where the signer is physically present with the document sender or a witness, often using a shared device.
Intent to Sign
The signer's clear indication they intend to be legally bound by the document. Demonstrated through explicit actions like clicking "Sign" or drawing a signature.
K
Knowledge-Based Authentication (KBA)
Identity verification using questions only the signer should know, often drawn from credit bureau or public records (e.g., "What street did you live on in 2015?").
L
Long-Term Validation (LTV)
Technology ensuring digital signatures remain verifiable long after signing, even if certificates expire. Embeds validation data within the signed document.
M
Multi-Factor Authentication (MFA)
Security requiring two or more verification methods: something you know (password), have (phone), or are (biometric).
Multi-Signer
A document requiring signatures from multiple parties. Can be configured for sequential (ordered) or parallel (any order) signing.
N
Non-Repudiation
The assurance that a signer cannot deny having signed a document. Achieved through cryptographic proof (digital signatures) or comprehensive audit trails (e-signatures).
Notarization
A process where a notary public verifies signer identity and witnesses the signature. Separate from e-signature but can be combined via Remote Online Notarization (RON).
P
PKI (Public Key Infrastructure)
A system of cryptographic keys, certificates, and Certificate Authorities enabling secure digital signatures and encryption. Foundation of digital signature technology.
Private Key
A secret cryptographic key known only to the signer. Used to create digital signatures. Must be kept secure to maintain signature validity.
Public Key
A cryptographic key that can be shared publicly. Used by others to verify digital signatures created with the corresponding private key.
Q
Qualified Electronic Signature (QES)
Under eIDAS (EU), the highest level of e-signature. Created with a qualified certificate and signature creation device. Equivalent to handwritten signature in all EU states.
R
Recipient
A person designated to receive, view, or sign a document. Recipients may be signers, carbon copy (CC), or in-person signers.
Remote Online Notarization (RON)
The process of notarizing documents via video conference rather than in-person. Signer and notary connect online for identity verification and witnessing.
Routing Order
The sequence in which multiple signers receive and sign a document. Can be sequential (one after another) or parallel (all at once).
S
Seal
An electronic seal used by organizations (rather than individuals) to guarantee document origin and integrity. Common in EU under eIDAS.
Signature Adoption
The act of a signer choosing and accepting their signature representation (typed, drawn, or uploaded) for use on documents.
Signing Order
The specified sequence in which recipients must sign a document. Used for workflows where one signature must precede another.
SOC 2
Service Organization Control 2. An auditing standard evaluating data security practices. SOC 2 Type II certification indicates ongoing security compliance.
T
Tamper-Evident Seal
Technology that detects any changes to a signed document after signing. If the document is modified, the seal shows it has been tampered with.
Template
A reusable document with pre-placed signature and form fields. Allows sending the same document structure to multiple recipients without recreating fields.
Timestamp
A record of the exact date and time an action occurred (signing, viewing, etc.). Often includes timezone and is provided by a trusted time source.
Trusted Timestamp
A timestamp issued by a trusted third-party Timestamp Authority (TSA). Provides independent verification of when a signature occurred.
U
UETA
Uniform Electronic Transactions Act (1999). A model law adopted by 47 US states establishing legal equivalence of electronic and paper records/signatures.
W
Wet Signature
A traditional handwritten signature made with pen on paper. Called "wet" because of the wet ink. Still required for certain legal documents.
Witness
A person who observes a signature being made but does not sign the document themselves. Some documents require witnesses for legal validity.
X
X.509 Certificate
The standard format for public key certificates used in PKI. Contains the public key, identity information, and CA signature.
Key Acronyms Quick Reference
| Acronym | Full Name | Quick Definition |
|---|---|---|
| ESIGN | Electronic Signatures in Global and National Commerce Act | US federal law making e-signatures legal |
| UETA | Uniform Electronic Transactions Act | State-level e-signature law (47 states) |
| eIDAS | Electronic Identification, Authentication and Trust Services | EU regulation for e-signatures |
| PKI | Public Key Infrastructure | Cryptographic system for digital signatures |
| CA | Certificate Authority | Trusted issuer of digital certificates |
| KBA | Knowledge-Based Authentication | Identity verification via personal questions |
| RON | Remote Online Notarization | Notarization via video conference |
| MFA | Multi-Factor Authentication | Security using multiple verification methods |
| AES | Advanced Electronic Signature | eIDAS signature with enhanced security |
| QES | Qualified Electronic Signature | Highest eIDAS signature level |
Frequently Asked Questions
What is the difference between e-signature and digital signature?
An e-signature (electronic signature) is any electronic mark indicating agreement - typed names, clicks, drawn signatures. A digital signature is a specific type using PKI cryptography to create an encrypted fingerprint. All digital signatures are e-signatures, but not all e-signatures are digital signatures.
What does ESIGN stand for?
ESIGN stands for the Electronic Signatures in Global and National Commerce Act, a US federal law passed in 2000 that grants electronic signatures the same legal validity as handwritten signatures.
What is an audit trail in e-signatures?
An audit trail is a chronological record of all actions taken on a document: when it was created, sent, viewed, signed, and by whom. It includes timestamps, IP addresses, and authentication methods. Audit trails provide legal evidence of the signing process.
What is PKI in digital signatures?
PKI (Public Key Infrastructure) is a cryptographic system using paired public and private keys to create and verify digital signatures. The signer uses their private key to create a unique signature, which anyone can verify using the corresponding public key.
What is a certificate of completion?
A certificate of completion (or signing certificate) is a document summarizing the e-signature transaction. It typically includes: signer names, email addresses, signature timestamps, IP addresses, authentication methods, and document hash. It serves as legal proof of signing.
What is the meaning of non-repudiation?
Non-repudiation means a signer cannot deny having signed a document. Digital signatures achieve this through cryptographic proof. E-signatures achieve it through audit trails, identity verification, and tamper detection.
Ready to Put These Terms Into Practice?
Start sending legally binding e-signatures in minutes.
Start 15-Day Free TrialNo credit card required - ESIGN & UETA compliant