office_BOLD

Compliance and legal requirements for ERPs

For enterprise resource program producers or anyone wanting to integrate electronic signatures into their workflows.

Contact us with compliance questions

Pain Points in the Integration of Electronic Signatures in ERP and Core Application Solutions

ERP/core application vendors should ensure that their software solutions meet regulatory requirements and adhere to industry-specific standards to ensure optimal integration and application across different industries. An essential function of the ERP/core application providers' performance is to combat fraud and ensure security when accessing the systems effectively.

Key features of signature trust services from a legal perspective

There are several challenges to overcome when integrating electronic signatures into ERP/core application solutions, especially the legal framework and the complexity of the integration. Companies are therefore looking for ideal signature trust service providers that can take on these challenges and enable easy integration of the signature solution into existing ERP/core application processes. The legal framework for electronic signatures in Europe is defined by the eIDAS Regulation and in Switzerland by ZertES.

svgviewer-output

Integration into existing ERP/core application systems

svgviewer-output

Fulfillment of the requirements of the eIDAS Regulation (Europe) or ZertES (Switzerland)

svgviewer-output

Support of different types of electronic signatures

svgviewer-output

Legally binding nature, verifiability, and retention obligations of electronic signatures

Legal requirements for ERP/core application providers to integrate electronic signatures

STS_EU Check_64px
Data protection

ERP/core application providers must ensure data protection regulations process electronic signatures. In particular, the principles of data economy and purpose limitation should be considered. Care must also be taken to ensure that unauthorized persons cannot access or manipulate the signature data.

thumb_up_filled_LIGHT
Confidentiality

ERP/core application providers should protect data from unauthorized access and manipulation during the signature process. For example, the encrypted transmission of signature data should always take place.

nut_and_bolt_LIGHT
Liability

ERP/core application providers should establish clear liability rules for electronic signatures. This can be done, for example, by concluding service level agreements (SLAs) with customers.

internet_of_things_LIGHT
Interoperability

ERP/core application providers should ensure that electronic signatures are interoperable with other systems and solutions. In particular, the requirements of the eIDAS (Europe) or ZertES (Switzerland) regulation, which provide for mutual recognition of electronic signatures within the EU or Switzerland, should be considered.

These requirements can vary by country and region. Therefore, ERP/core application providers must be aware of the specific needs of their target markets and ensure that they meet them.

Legal framework for ERP / core applications in Europe and Switzerland

Rechtlicher Rahmen für ERP Lösungen in Europa und der Schweiz

In Europe, EU Regulation No. 910/2014, also known as the eIDAS Regulation, standardizes the legal framework for electronic signatures in the EU. The Federal Electronic Signature Act (ZertES) provides the legal basis for electronic signatures in Switzerland.

 

More about eIDAS

More about ZertES

Products and solutions

Signing Service

  • Cloud-based and easily integrated remote signing service.
  • Enables the legally valid digital signing of contracts in applications.
  • eIDAS & ZertES compliant

Electronic seal

  • Learn what an electronic seal is here
  • Learn what types of electronic seals there are
  • How a company successfully seals electronically

Identification

  • Smart Registration Service
  • Legally valid identification and registration solution for electronic signatures.
  • Quick and easy integration
  • The most extensive selection of identification methods on the market, including FINMA-compliant video identification

Authentication

  • Learn what two-factor authentication is
  • And why it takes an authentication solution for the electronic signature