E-Signature Glossary
Master the terminology of digital document logistics, security, and global compliance.
Audit Trail
A chronologically ordered record of all activities involving a document, from upload to final signature. IUSign stores this trail immutably using SHA-256 hash chaining.
Digital Signature
A cryptographic method for verifying the authenticity and integrity of a digital document. Unlike a simple electronic signature, it provides mathematical proof that the document was not altered.
ESIGN Act
The Electronic Signatures in Global and National Commerce Act. A US federal law passed in 2000 that recognizes electronic signatures as legally binding if certain requirements are met.
eIDAS
Electronic Identification, Authentication and Trust Services. A regulation by the European Union that sets the standards for electronic identification and trust services for electronic transactions in the internal market.
Hash Chaining
A technique where each audit log entry contains the cryptographic hash of the previous entry, making it impossible to alter history without breaking the entire chain.
PDF Flattening
The process of merging interactive elements (like signatures and text boxes) directly into the PDF content stream, making them permanent and non-editable.
SHA-256
A secure cryptographic hash algorithm that produces a 256-bit (32-byte) signature for a piece of data. It is the industry standard for verifying document integrity.
UETA
Uniform Electronic Transactions Act. A US state-level act that establishes the legal equivalent of electronic and paper-based signatures.
White-Labeling
The ability to remove IUSign's branding and replace it with your own organization's logo, colors, and domain for a seamless user experience.
Zero-Persistence
A security architecture where sensitive document data is processed in ephemeral memory and never stored indefinitely on unencrypted disks.
Still have questions?
Our comprehensive Knowledge Base has deep dives into every technical and legal aspect of the IUSign platform.