Example of Digital Signature Acceptance Policy

1.     Purpose

The purpose of this policy is to provide guidance on when digital signatures are considered accepted means of validating the identity of a signer in XXX electronic documents and correspondence, and thus a substitute for traditional “wet” signatures, within the organization.  Because communication has become primarily electronic, the goal is to reduce confusion about when a digital signature is trusted.

2.     Scope

This policy applies to all XXX employees and affiliates. This policy applies to all XXX employees, contractors, and other agents conducting XXX business with a XXX-provided digital key pair.  This policy applies only to intra-organization digitally signed documents and correspondence and not to electronic materials sent to or received from non-XXX affiliated persons or organizations.

3.     Policy

A digital signature is an acceptable substitute for a wet signature on any intra-organization document or correspondence, with the exception of those noted on the site of the Chief Financial Officer (CFO) on the organization’s intranet:  <CFO’s Office URL>

The CFO’s office will maintain an organization-wide list of the types of documents and correspondence that are not covered by this policy.

Digital signatures must apply to individuals only.  Digital signatures for roles, positions, or titles (e.g. the CFO) are not considered valid.


Digital signature acceptance requires specific action on both the part of the employee signing the document or correspondence (hereafter the signer), and the employee receiving/reading the document or correspondence (hereafter the recipient).

1. Signer Responsibilities

  • Signers must obtain a signing key pair from CEO/CFO.  
  • This key pair will be generated using XXX’s Public Key Infrastructure (PKI) and the public key will be signed by the XXX’s Certificate Authority (CA),
  • Signers must sign documents and correspondence using software approved by XXX IT organization.Signers must protect their private key and keep it secret.
  • If a signer believes that the signer’s private key was stolen or otherwise compromised, the signer must contact XXX Identity Management Group immediately to have the signer’s digital key pair revoked.

2. Recipient Responsibilities

  • Recipients must read documents and correspondence using software approved by XXX IT department.
  • Recipients must verify that the signer’s public key was signed by the XXX’s Certificate Authority (CA), by viewing the details about the signed key using the software they are using to read the document or correspondence.
  • If the signer’s digital signature does not appear valid, the recipient must not trust the source of the document or correspondence.
  • If a recipient believes that a digital signature has been abused, the recipient must report the recipient’s concern to XXX Identity Management Group.

4.     Policy Compliance

4.1 Compliance Measurement

The IT team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.

4.2  Exceptions

Any exception to the policy must be approved by the IT team in advance.

4.3  Non-Compliance

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Leave a Reply