We at Tech Essentials realize this has been a doozy of a week in terms of news—mostly political and mostly bad. For those who needed a respite from Tuesday’s chaotic debate and the torrent of election-focused headlines, we offered a live virtual conference yesterday that highlighted how customers are using RPost’s RMail and RSign products to optimize financial processes, transaction automation and affordability with feature-rich e-sign and e-security.
Most clichés originated from terms that were once clever, useful and connoted some broader meaning from hearing the phrase. These welcome, useful terms catch on and last over time but eventually get overused and then get relegated to cliché status. “The Hair of the Dog,” as an example, lives in infamy today to mean, ‘indulge again in what you overindulged, and you may feel better’. This term originated from a 16th century medical “remedy” where if you were bitten by a rabid dog, you would put the burnt hair of that dog on the wound, and the hair would supposedly act as an antidote.
Has this happened to you recently: You get an email from yourself asking you to click a link to see an agenda you didn’t write or for an invoice you never sent? The newest are people sending you pictures of checks that they supposedly put in the mail to you (hoping you click on the image which then makes nefarious things happen). Earlier this week I saw an email from myself with an exact duplicate of my own RPost signature asking me to click a link to register for a long-past webinar and download a strange document that was titled, “PO#09162020.doc”.
More banking clients self-install RSign using RPost’s E-Sign & E-Security (Free) Work-from-Home Readiness Program to quickly, freely and easily e-sign Payroll Protection Program and other Loan applications. Industry organizations across sectors have joined RPost’s coalition to make their small business clients aware of these e-sign and e-security tools and how to access them free with RPost’s crisis software donation program (see who has joined).
It is easy to fall into a workplace routine; you know how to get something done and your process works. Eventually you look to train others to use the shortcuts and process that you have found works, happy to hand off the tasks to another.
Impressions of e-signatures today still depend on who you ask. Many users report e-signatures today as “a life saver”, but some still think of e-signature services as “scary to use” or “simply not trustworthy”.
Electronic signature technology is already the industry standard for executing business contracts in almost every industry. Professionals in real estate, legal services, investment management and insurance, particularly, have adopted use of this technology to transact efficiently. As e-signatures have now reached mainstream levels of adoption, where does the technology go from here?
Much of the uncertainty as to the legality of electronically signed contracts has dissipated over the last decade and a half — through definitions in the broad state (UETA) and Federal (ESIGN) statutes, and through practice by the first few waves of adopters.
E-signature technology offers much more than just the ability to get a document signed remotely.
E-signature technology also provides businesses with the opportunity to completely reinvigorate decades-old business processes, enhance productivity, and automate mundane work flows.
People use e-signatures every day without even realizing they’re “e-signing” — signing on an electronic signature pad at grocery store check-out, replying to an email with a typed confirmation of terms, or putting in a PIN code for a debit card transaction, for example. Most people have no doubts about the legality of these everyday “e-sign” transactions.