Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Digital Signature Capture

Posted on 2014-03-28
3
Medium Priority
?
340 Views
Last Modified: 2014-03-31
I'm looking for a way to present a contract on a website and enable customers to agree to it by submitting their digital signature. I assume this is doable, but I'm hoping it can be done using the standard web languages (php, javascript, html) instead of Java.

I've been searching the web and EE for this, but I'm just a web developer and basic php programmer, and everything I find is just a bit over my head.

Is there a way? Maybe even a simple way? Thanks!
0
Comment
Question by:Jonathan Greenberg
  • 2
3 Comments
 
LVL 111

Accepted Solution

by:
Ray Paseur earned 2000 total points
ID: 39963729
Yes, this is subject to the UETA.  I think this was a law from Bill Clinton's administration.  Whenever you check a box that says, "I agree to the terms and conditions" you're using the UETA to make a contractual agreement.

A simple checkbox that is appropriately captioned is probably enough.  If you want a little bit more structure, you might ask them to enter their initials or type the name into a "signature" box.  There is no legal requirement to capture a visual representation of a handwritten signature.

Information on how to handle checkboxes with current WWW technologies:
http://www.experts-exchange.com/Web_Development/Web_Languages-Standards/PHP/A_5450-Common-Sense-Examples-Using-Checkboxes-with-HTML-JavaScript-and-PHP.html
0
 

Author Comment

by:Jonathan Greenberg
ID: 39967722
Hi, Ray. Thanks so much for your very helpful answer! I may want to inquire a little further on the topic, but, if so, I'll do so in a new question.

Regards,
Jon
0
 
LVL 111

Expert Comment

by:Ray Paseur
ID: 39967734
Thanks for the points, Jon.  Best regards, ~Ray
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
The viewer will learn how to count occurrences of each item in an array.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question