Certinal eSign Glossary: Key Terms for eSignatures, Document Management, and Digital Transaction Management
A
B
C
- Capacity To Consent
- CCPA (California Consumer Privacy Act)
- Certificate Authority (CA)
- Certificate Chain
- Certificate Management
- Certificate Policy (CP)
- Certificate Practice Statement (CPS)
- Certificate Transparency
- Certificate Verification
- Certified Digital Signature
- Chain of Custody
- Challenge-Response Authentication
- Clickwrap Agreement
- Cloud service providers
- Cloud Signature Consortium
- Cloud Trust Service
- Cloud-Based Signing
- Coerced Consent
- Completion Certificate
- Compliance Audit
- Compliance Certificate
- Compliance Document
- Compliance Management
- Compliance Reporting
- Compliance Rule Set
- Compliance Verification
- Conditional Consent
- Conditional Logic
- Consent Dashboard
- Consent Form
- Consent Form Template
- Consent Lifecycle Management
- Consent Management
- Consent Revocation
- Content Encryption
- Content Integrity
- Contract Management
- Cross-Border eSignature
- Cross-Certification
- Cryptographic Hash
- Cryptography
- CSV files
D
- Data in Transit
- Decryption
- Digital Certificate
- Digital Consent
- Digital Document Storage
- Digital Envelope
- Digital Identity Certificate
- Digital Identity Management
- Digital Key
- Digital Locker
- Digital Personal Data Protection Act (DPDP Act)
- Digital Rights Management (DRM)
- Digital Signature
- Digital Signature Algorithm (DSA)
- Digital Signature Certificate
- Digital Signature Portal
- Digital Signature Standard (DSS)
- Digital Signatures Directive (DSD)
- Digital Transformation
- Digital Trust
- Digital Watermark
- Distributed Signing
- Document Acceptance
- Document Annotation
- Document Archiving
- Document Authentication
- Document Backup
- Document Collaboration
- Document Compliance
- Document Control
- Document Conversion
- Document Distribution
- Document Encryption
- Document Encryption Key
- Document Escrow
- Document Exchange Network
- Document Execution
- Document Expiry
- Document Fingerprint
- Document Hashing
- Document Identification
- Document Integrity
- Document Lifecycle
- Document Management Policy
- Document Management System (DMS)
- Document Metadata
- Document Processing
- Document Redaction
- Document Retention Policy
- Document Retrieval
- Document Review
- Document Review Process
- Document Review Workflow
- Document Routing
- Document Security
- Document Security Management
- Document Segmentation
- Document Shredding
- Document Sign-Off
- Document Signing Certificate
- Document Signing Platform
- Document Submission
- Document Templates
- Document Tracking
- Document Validation
- Document Verification
- Document Versioning
- Document Workflow
- Domain Keys Identified Mail (DKIM)
- DPA (Data Processing Agreement)
- Dynamic Consent
- Dynamic Signature
E
- E-Signature Solutions
- eIDAS (Electronic Identification, Authentication, and Trust Services)
- Electronic Certificate
- Electronic Consent
- Electronic Consent Form
- Electronic Credential
- Electronic Document
- Electronic Document Delivery
- Electronic Document Exchange
- Electronic Document Signing
- Electronic Endorsement
- Electronic Filing
- Electronic Health Record
- Electronic Identification (eID)
- Electronic Invoice
- Electronic Key
- Electronic Medical Record
- Electronic Notary (eNotary)
- Electronic Records
- Electronic Seal
- Electronic Service Provider (ESP)
- Electronic Signature
- Electronic Signature Certificate
- Electronic Signature Framework
- Electronic Signature Platform
- Electronic Signature Standard
- Electronic Witnessing
- Elliptic Curve Cryptography (ECC)
- Email Authentication
- Embedded Signature
- Encryption
- Encryption Key
- Enterprise Signing Solution
- eSign
- ESIGN Act
- eSignature Authentication
- eSignature Compliance
- eSignature Data
- eSignature Legislation
- eStamping
- EU GMP Annex 11
- eWitness
- Express Consent
I
K
L
M
P
- Paperless Office
- Parental Consent
- Patient Intake Forms
- PDPA
- PFX files
- PIPEDA (Personal Information Protection and Electronic Documents Act)
- Policy Authority
- Policy Compliance
- Policy Mapping
- Privacy Act 1988
- Private Key Encryption
- Proxy Consent
- Public Key Directory
- Public Key Encryption
- Public Key Infrastructure (PKI)
- Purpose Limitation
R
S
- Secure Document Storage
- Secure Electronic Transaction (SET)
- Secure Envelope
- Secure Key Storage
- Secure Socket Layer (SSL)
- Send later
- Sequential Signing
- Sign Here Tag
- Sign-Off Process
- Signatory
- Signature Alias
- Signature Appearance
- Signature Authenticity
- Signature Authority
- Signature Authorization
- Signature Backup
- Signature Block
- Signature Capture
- Signature Capture Device
- Signature Certificate
- Signature Chain
- Signature Cloning
- Signature Collection
- Signature Compliance
- Signature Consent
- Signature Control
- Signature Creation Data
- Signature Custodian
- Signature Delegation
- Signature Enforcement
- Signature Event
- Signature Evidence
- Signature Evidence Management
- Signature Evidence Record
- Signature Exclusion
- Signature Expiry
- Signature Field
- Signature Image
- Signature Issuance
- Signature Key
- Signature Lifecycle
- Signature Logging
- Signature Metadata
- Signature Pad
- Signature Policy
- Signature Profile
- Signature Protocol
- Signature Proxy
- Signature Recertification
- Signature Renewal
- Signature Request
- Signature Request Management
- Signature Risk Management
- Signature Stamp
- Signature Token
- Signature Validation
- Signature Verification Process
- Signature Visualization
- Signer Access
- Signer Assurance
- Signer Authentication
- Signer Delegation
- Signer ID
- Signer Roles
- Signer Trust Level
- Signer Verification
- Signer’s Intent
- Signing Procedure
- Signing Service
- Signing Session
- Simple Electronic Signature
- Simultaneous Signing
- Single Sign-On (Sso)
- Smart Card Signing
- Smart Contract Signatures
- Specific Consent
- Standard Electronic Signature
- Symmetric Encryption
T
- Tamper Detection
- Tamper-Evident Seal
- Tamper-Resistant Signature
- Tamperproof Records
- Templates
- Text Tags
- Therapeutic Misconception
- Time Stamping
- Time-based One-Time Password (TOTP)
- Timestamp Authority (TSA)
- Title 21 CFR Part 11
- TLS (Transport Layer Security)
- Token-Based Authentication
- Trust Anchor
- Trust Service Provider (TSP)
- Trusted Certificate
- Trusted Document Timestamping
- Two-Factor Authentication (2FA)