{
    "componentChunkName": "component---src-templates-blog-article-js",
    "path": "/blog/recognized-electronic-signature-what-it-is-and-how-it-works",
    "result": {"data":{"page":{"edges":[{"node":{"seo":{"title":"Tecalis Blog | Identity, Digital Transformation, RegTech","meta_description":"Tecalis Blog. Access insights, trends and valuable content on Identity, Digital Transformation and RegTech."},"title":"Blog","search_title":"What topic are you looking for?","search_placeholder":"For example, electronic signature","search_button":"Search","search_show_all":"Show all topics"}}]},"categories":{"edges":[{"node":{"id":"Blog-categories_11","name":"Economy","url":"economy"}},{"node":{"id":"Blog-categories_12","name":"User experience","url":"user-experience"}},{"node":{"id":"Blog-categories_13","name":"Electronic Signature","url":"electronic-signature"}},{"node":{"id":"Blog-categories_14","name":"Risk Management","url":"risk-management"}},{"node":{"id":"Blog-categories_15","name":"Legal Framework ","url":"regulatory-legal-framework"}},{"node":{"id":"Blog-categories_21","name":"Digital Onboarding ","url":"digital-onboarding"}},{"node":{"id":"Blog-categories_22","name":"RPA - Automation","url":"rpa-automation"}},{"node":{"id":"Blog-categories_23","name":"Digital Transformation","url":"digital-transformation"}},{"node":{"id":"Blog-categories_24","name":"Identity Verification","url":"identity-verification"}},{"node":{"id":"Blog-categories_27","name":"X Tech","url":"x-tech"}},{"node":{"id":"Blog-categories_29","name":"Fraud Prevention","url":"fraud-prevention"}},{"node":{"id":"Blog-categories_31","name":"Electronic Invoice","url":"electronic-invoice-e-invoicing-digital"}},{"node":{"id":"Blog-categories_38","name":"Customer Hub for sales","url":"commercial-hub"}},{"node":{"id":"Blog-categories_41","name":"Sales Processes","url":"sales-processes"}}]},"blog":{"frontmatter":{"url":"/blog","subscribe":"Subscribe","see_more":"See more themes","see_less":"See less themes","view_more":"View more","recommended":"Recommendations","explore":"Explore by category","newsletter":{"title":"Get the latest news right in your inbox","description":"By clicking submit below, you consent to allow Tecalis to store and process the personal information submitted above to provide you the content requested."}}},"post":{"seo":{"title":"Recognized electronic signature: what it is, uses, and recommendations","meta_description":"Discover what a recognized electronic signature is, its eIDAS validity, differences with advanced signatures, and how to digitize processes with Tecalis.","image_2":{"localFile":{"publicURL":"/static/b5d7bef66d6b3d71afd48793890778bd/preview_blog_EN_ficha_kyc_349899aef6.png"}}},"id":"Blog-posts_392","name":"Recognized electronic signature: what it is, uses, and recommendations","url":"recognized-electronic-signature-what-it-is-and-how-it-works","creation_datetime":"19 February 2026","published_at":"02 March 2026","creation_date":null,"modification_date":null,"photo_2":{"name":"Blogpost_EN_firma_electronica_reconocida.png","alternativeText":"","localFile":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","images":{"fallback":{"src":"/static/b5d7bef66d6b3d71afd48793890778bd/80ad6/preview_blog_EN_ficha_kyc_349899aef6.webp","srcSet":"/static/b5d7bef66d6b3d71afd48793890778bd/dab6e/preview_blog_EN_ficha_kyc_349899aef6.webp 350w,\n/static/b5d7bef66d6b3d71afd48793890778bd/d2e75/preview_blog_EN_ficha_kyc_349899aef6.webp 512w,\n/static/b5d7bef66d6b3d71afd48793890778bd/19831/preview_blog_EN_ficha_kyc_349899aef6.webp 520w,\n/static/b5d7bef66d6b3d71afd48793890778bd/5ad9c/preview_blog_EN_ficha_kyc_349899aef6.webp 636w,\n/static/b5d7bef66d6b3d71afd48793890778bd/f0e0f/preview_blog_EN_ficha_kyc_349899aef6.webp 704w,\n/static/b5d7bef66d6b3d71afd48793890778bd/29688/preview_blog_EN_ficha_kyc_349899aef6.webp 928w,\n/static/b5d7bef66d6b3d71afd48793890778bd/c8ce3/preview_blog_EN_ficha_kyc_349899aef6.webp 972w,\n/static/b5d7bef66d6b3d71afd48793890778bd/80ad6/preview_blog_EN_ficha_kyc_349899aef6.webp 1136w","sizes":"(max-width: 768px) 50vw, 972px"},"sources":[]},"width":1136,"height":590}}}},"content":[{"id":4223,"text":"<p><strong>Recognized electronic signatures </strong><span style=\"font-weight: 400;\">are the highest standard of security and legal validity in the European and global digital ecosystem. As organizations move away from paper, the need to secure commercial agreements and legal procedures makes it essential to understand this technology.&nbsp;</span></p>\n<p><span style=\"font-weight: 400;\">Choosing the wrong type of signature can result in a contract being invalidated or security breaches. This article explains </span><strong>what a recognized electronic signature is</strong><span style=\"font-weight: 400;\">, its legal framework under the </span><strong>eIDAS Regulation</strong><span style=\"font-weight: 400;\">, in which cases it is mandatory, and how to implement it efficiently.</span></p>","strapi_component":"blog.content-rich-text"},{"id":90,"text":"<p><span style=\"font-weight: 400;\">The qualified electronic signature is the only one that reverses the burden of proof in a legal dispute. If someone repudiates a contract, it will be that person who must technically prove that the signature is not theirs, providing companies with absolute legal protection against fraud.</span></p>","color":"default","strapi_component":"blog.callout"},{"id":994,"name":null,"description":"<p><strong>CTA: Sign documents now with full legal validity</strong></p>","button":"Use Tecalis Sign Business for 6 months","url":"https://www.tecalis.com/products/electronic-signature","blank":true,"image":null,"strapi_component":"blog.cta"},{"id":4224,"text":"<h2><strong>What is a recognized signature and how does it work?</strong></h2>\n<p><span style=\"font-weight: 400;\">A </span><strong>recognized electronic signature </strong><span style=\"font-weight: 400;\">is one that is based on a qualified certificate and is generated by a secure signature creation device (QSCD).</span></p>\n<p><span style=\"font-weight: 400;\">Thus, a recognized electronic signature is a type of </span><strong>electronic signature </strong><span style=\"font-weight: 400;\">that is considered, for all legal purposes, a direct equivalent to a traditional </span><a href=\"https://www.tecalis.com/blog/handwritten-signature-legality-digitization\" target=\"_blank\" rel=\"noopener\"><strong>handwritten signature</strong></a><span style=\"font-weight: 400;\">.</span></p>\n<p><span style=\"font-weight: 400;\">It works on the basis of </span><strong>asymmetric cryptography </strong><span style=\"font-weight: 400;\">and public key infrastructures (PKI). Recognized electronic signatures are currently referred to as qualified electronic signatures under the European eIDAS regulation. The process guarantees three fundamental principles:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Unambiguous identification: It </strong><span style=\"font-weight: 400;\">confirms without margin for error who the signer is.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Absolute integrity: </strong><span style=\"font-weight: 400;\">It detects any modification of the document after it has been signed.</span></li>\n</ul>\n<p><strong>Non-repudiation: <span style=\"font-weight: 400;\">It prevents the signer from legally denying that they signed the document.</span></strong></p>\n<h3><strong>Electronic identification and identity verification</strong></h3>\n<p><span style=\"font-weight: 400;\">To obtain a recognized electronic signature, the critical step is the prior </span><strong>electronic identification </strong><span style=\"font-weight: 400;\">of the user. A qualified certificate cannot be issued without a </span><a href=\"https://www.tecalis.com/news/qualified-trust-services-provider-qtsp-european-union-eidas\" target=\"_blank\" rel=\"noopener\"><strong>Qualified Trust Service Provider (QTSP)</strong></a><span style=\"font-weight: 400;\"> verifying the applicant's real identity.&nbsp;</span></p>\n<p><span style=\"font-weight: 400;\">To achieve this unambiguous identification, providers use extremely secure mechanisms that comply with </span><strong>Anti-Money Laundering (AML) </strong><span style=\"font-weight: 400;\">and </span><a href=\"https://www.tecalis.com/blog/kyc-know-your-customer\" target=\"_blank\" rel=\"noopener\"><strong>Know Your Customer (KYC)</strong></a><span style=\"font-weight: 400;\"> regulations. The most common methods include:</span></p>\n<ul>\n<li aria-level=\"1\"><strong>Physical appearance: </strong><span style=\"font-weight: 400;\">The user goes in person to a Registration Authority (such as a public office or notary) with their official identity document (ID card, passport).</span></li>\n</ul>\n<ul>\n<li aria-level=\"1\"><strong>Video identification (VideoID): </strong><span style=\"font-weight: 400;\">A synchronous video call or an asynchronous video recording process supervised by trained agents, where facial biometrics, liveness detection, and identity document validation technologies are applied using OCR (Optical Character Recognition) technology and hologram or NFC chip verification.</span></li>\n<li aria-level=\"1\"><strong>Identification using another qualified certificate: <span style=\"font-weight: 400;\">If the user already has a valid certificate (e.g., electronic ID card), they can use it to identify themselves online and obtain a new one.</span></strong></li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":91,"text":"<p><span style=\"font-weight: 400;\">The issuance of a qualified certificate requires compliance with anti-money laundering regulations. Fortunately, biometric and AI technologies such as video identification allow this rigorous step to be completed 100% remotely and in just a few minutes.</span></p>","color":"default","strapi_component":"blog.callout"},{"id":915,"title":null,"alt":"Woman signing a document related to a qualified electronic signature at an office desk.","figcaption":null,"link":null,"blank":null,"image":{"id":4897,"name":"firma_electronica_reconocida_interior1.png","hash":"validacion_documento_identidad_interior_1_5_1_378fe80c8c","sha256":null,"ext":".png","mime":"image/png","size":155.37,"url":"/uploads/validacion_documento_identidad_interior_1_5_1_378fe80c8c.png","provider":"local","provider_metadata":null,"created_at":"2026-03-02T08:42:10.000Z","updated_at":"2026-03-02T08:42:56.000Z","alternativeText":"","caption":"","width":954,"height":525,"formats":{"thumbnail":{"name":"thumbnail_validación-documento-identidad_interior_1 (5) (1).png","hash":"thumbnail_validacion_documento_identidad_interior_1_5_1_378fe80c8c","ext":".png","mime":"image/png","width":245,"height":135,"size":56.06,"path":null,"url":"/uploads/thumbnail_validacion_documento_identidad_interior_1_5_1_378fe80c8c.png"},"medium":{"name":"medium_validación-documento-identidad_interior_1 (5) (1).png","hash":"medium_validacion_documento_identidad_interior_1_5_1_378fe80c8c","ext":".png","mime":"image/png","width":750,"height":413,"size":423.62,"path":null,"url":"/uploads/medium_validacion_documento_identidad_interior_1_5_1_378fe80c8c.png"},"small":{"name":"small_validación-documento-identidad_interior_1 (5) (1).png","hash":"small_validacion_documento_identidad_interior_1_5_1_378fe80c8c","ext":".png","mime":"image/png","width":500,"height":275,"size":199.8,"path":null,"url":"/uploads/small_validacion_documento_identidad_interior_1_5_1_378fe80c8c.png"}},"previewUrl":null,"localFile___NODE":"6a752922-3e94-56bd-8717-b0e9b6d332d1"},"strapi_component":"blog.image"},{"id":4225,"text":"<h3><strong>The role of the qualified certificate in recognized signatures</strong></h3>\n<p><strong><span style=\"font-weight: 400;\">The </span>qualified certificate <span style=\"font-weight: 400;\">is, in essence, the signer's \"digital ID card.\" It is an electronic document issued by a Certification Authority that links the validation data of a signature to a natural or legal person, confirming their identity in an irrefutable manner.</span></strong></p>\n<p><span style=\"font-weight: 400;\">For a signature to be considered \"recognized\" or \"qualified,\" the certificate must meet strict technical requirements regulated by eIDAS:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Audited issuance: </strong><span style=\"font-weight: 400;\">It must be issued exclusively by a Qualified Trust Service Provider (QTSP) included in the European Union's Trust Lists.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Secure Device (QSCD): </strong><span style=\"font-weight: 400;\">Cryptographic keys must be stored in high-security hardware.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong><span style=\"font-weight: 400;\"><strong>Cloud signature</strong>: Currently, the law allows this certificate to be hosted on Cryptographic Servers (HSM) in the cloud, allowing the user to sign from their mobile phone with <strong><a href=\"https://www.tecalis.com/blog/two-step-authentication-2FA-verification-which-is-account-activate-factors-security-systems-configure-business-second-factor\" target=\"_blank\" rel=\"noopener\">two-factor authentication (2FA).</a></strong></span></strong></li>\n</ul>\n<h3><strong><span style=\"font-weight: 400;\"><strong>Differences between simple electronic signatures, advanced electronic signatures, and recognized electronic signatures</strong></span></strong></h3>\n<p><span style=\"font-weight: 400;\">The <strong><a href=\"https://www.tecalis.com/es/blog/eidas-electronic-identification-trust-services\" target=\"_blank\" rel=\"noopener\">eIDAS Regulation</a> </strong>classifies electronic signatures into three technical and legal levels. Choosing the right one is vital to ensure the legal certainty of corporate agreements:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https://www.tecalis.com/blog/electronic-signature-simple-what-is-definition-eidas-types-characteristics-differences-regulation\" target=\"_blank\" rel=\"noopener\"><strong>Simple Electronic Signature</strong></a><strong>: </strong><span style=\"font-weight: 400;\">Basic security level. This is data attached to other data (e.g., accepting </span><em><span style=\"font-weight: 400;\">cookies </span></em><span style=\"font-weight: 400;\">or web terms). It does not allow the signer to be unequivocally identified and requires additional evidence to be provided in the event of a lawsuit.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https://www.tecalis.com/blog/advanced-electronic-signature-qualified-differences-use-cases\" target=\"_blank\" rel=\"noopener\"><strong>Advanced Electronic Signature</strong></a><strong>: </strong><span style=\"font-weight: 400;\">High security level. It uniquely identifies the signatory, detects any subsequent alterations, and guarantees the integrity of the document through cryptography. It is the most efficient solution for employment contracts and B2B agreements.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Recognized (Qualified) Electronic Signature: </strong>Maximum security level. It requires the use of a <strong>qualified certificate </strong>and a secure signature creation device (QSCD). It reverses the burden of proof in litigation and is mostly used in procedures with public administrations.</li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":4226,"text":"<h2><strong>Legal validity and regulatory framework: the eIDAS Regulation</strong></h2>\n<p><strong>Regulation (EU) No. 910/2014</strong><strong> (eIDAS) </strong><span style=\"font-weight: 400;\">is the cornerstone of the digital trust ecosystem in Europe. Its main objective is to ensure that cross-border electronic interactions between businesses, citizens, and public authorities are secure and seamless.&nbsp;</span></p>\n<p><strong><span style=\"font-weight: 400;\">In Spain, this regulation is complemented by </span>Law 6/2020 regulating certain aspects of electronic trust services<span style=\"font-weight: 400;\">.</span></strong></p>\n<h3><strong>Equivalence with handwritten signatures</strong></h3>\n<p><span style=\"font-weight: 400;\">The most important legal principle of recognized electronic signatures is found in Article 25.2 of the eIDAS Regulation: </span><em><span style=\"font-weight: 400;\">\"A qualified electronic signature shall have the same legal effect as a handwritten signature</span></em><span style=\"font-weight: 400;\">.</span><em><span style=\"font-weight: 400;\">\"</span></em></p>\n<p><span style=\"font-weight: 400;\">This means that no judge or administration can reject a document simply because it is signed electronically if it has a qualified signature.&nbsp;</span></p>\n<p><strong><span style=\"font-weight: 400;\">It also provides the principle of </span><a href=\"https://www.tecalis.com/blog/non-repudiation-what-is-signature-example-guarantees-deniability\" target=\"_blank\" rel=\"noopener\">non-repudiation</a><span style=\"font-weight: 400;\">: the signer cannot deny having signed the document unless they can technically prove that the certificate was hacked or stolen.</span></strong></p>","strapi_component":"blog.content-rich-text"},{"id":916,"title":null,"alt":"Woman wearing glasses filling out a form related to a recognized electronic signature on a clipboard, in a bright workspace next to a window.","figcaption":null,"link":null,"blank":null,"image":{"id":4898,"name":"firma_electronica_reconocida_interior_2.png","hash":"validacion_documentos_identidad_interior_2_1_b2a5ec0e03","sha256":null,"ext":".png","mime":"image/png","size":335.13,"url":"/uploads/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.png","provider":"local","provider_metadata":null,"created_at":"2026-03-02T08:50:35.000Z","updated_at":"2026-03-02T08:51:26.000Z","alternativeText":"","caption":"","width":1272,"height":700,"formats":{"thumbnail":{"name":"thumbnail_validacion-documentos-identidad_interior_2 (1).png","hash":"thumbnail_validacion_documentos_identidad_interior_2_1_b2a5ec0e03","ext":".png","mime":"image/png","width":245,"height":135,"size":50.45,"path":null,"url":"/uploads/thumbnail_validacion_documentos_identidad_interior_2_1_b2a5ec0e03.png"},"large":{"name":"large_validacion-documentos-identidad_interior_2 (1).png","hash":"large_validacion_documentos_identidad_interior_2_1_b2a5ec0e03","ext":".png","mime":"image/png","width":1000,"height":550,"size":742.01,"path":null,"url":"/uploads/large_validacion_documentos_identidad_interior_2_1_b2a5ec0e03.png"},"medium":{"name":"medium_validacion-documentos-identidad_interior_2 (1).png","hash":"medium_validacion_documentos_identidad_interior_2_1_b2a5ec0e03","ext":".png","mime":"image/png","width":750,"height":413,"size":423.29,"path":null,"url":"/uploads/medium_validacion_documentos_identidad_interior_2_1_b2a5ec0e03.png"},"small":{"name":"small_validacion-documentos-identidad_interior_2 (1).png","hash":"small_validacion_documentos_identidad_interior_2_1_b2a5ec0e03","ext":".png","mime":"image/png","width":500,"height":275,"size":191.46,"path":null,"url":"/uploads/small_validacion_documentos_identidad_interior_2_1_b2a5ec0e03.png"}},"previewUrl":null,"localFile___NODE":"dabc7d83-1928-5a9f-b5b7-3e11c2bb9e2b"},"strapi_component":"blog.image"},{"id":4227,"text":"<h3><strong>Use cases where recognized signatures are required by law</strong></h3>\n<p><span style=\"font-weight: 400;\">There are regulated sectors where </span><strong>advanced electronic signatures </strong><span style=\"font-weight: 400;\">are not sufficient and the law explicitly requires the use of </span><strong>recognized electronic signatures</strong><span style=\"font-weight: 400;\">:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Public Administration (AAPP): </strong><span style=\"font-weight: 400;\">Filing of high-value taxes, public tenders, and signing of official resolutions.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Legal and Notarial Sector: </strong><span style=\"font-weight: 400;\">Issuance of authorized electronic copies, notarial policies, powers of attorney, and binding communications with the Administration of Justice (LexNET in Spain).</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Healthcare Sector: </strong><span style=\"font-weight: 400;\">Signing of electronic prescriptions or medical records, where integrity and auditing are a matter of life and death.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Accounting Audit: <span style=\"font-weight: 400;\">Registered auditors must use a recognized electronic signature to sign their annual audit reports, giving the document public faith.</span></strong></li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":995,"name":null,"description":"<p><strong>How to digitize processes with full legal validity?</strong></p>","button":"Read our success story","url":"https://www.tecalis.com/case-studies/as-real-estate-lease-digital-signature-re-agreements-contracts","blank":true,"image":null,"strapi_component":"blog.cta"},{"id":4228,"text":"<h4><strong>When is an advanced electronic signature sufficient?</strong></h4>\n<p><span style=\"font-weight: 400;\">Although a recognized signature offers maximum security, it requires a certificate issuance process (onboarding) that can cause commercial friction.</span></p>\n<p><span style=\"font-weight: 400;\">For</span><strong> 95% of administrative and commercial procedures</strong><span style=\"font-weight: 400;\">, the advanced electronic signature is the ideal option. </span><strong>The advanced electronic signature is fully valid, legal, and much faster </strong><span style=\"font-weight: 400;\">for the user experience (UX).</span></p>\n<p><strong><span style=\"font-weight: 400;\">If a biometric or OTP (SMS) signature solution is used, a very robust legal shield is maintained without requiring the customer to have a prior certificate, and </span>for high-risk processes, it can be complemented with KYC to achieve the same level of probative and legal value as a recognized or qualified signature<span style=\"font-weight: 400;\">.</span></strong></p>\n<h4><strong>Why choose advanced signature over recognized signature?</strong></h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Agility: </strong><span style=\"font-weight: 400;\">It allows the user to sign instantly from their smartphone without having to install certificates in advance or possess a USB token. Evidence is collected through biometrics (speed, stroke pressure, graph), geolocation, IP, and time stamping.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Conversion: </strong><span style=\"font-weight: 400;\">In B2C or B2B sales processes, requiring the customer to provide a recognized signature can cause the sale to fall through if the customer does not have an active electronic ID or does not know how to use it. Advanced signatures using OTP (One Time Password) via SMS are legal, secure, and increase contract closure rates.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Success stories: <span style=\"font-weight: 400;\">It is the de facto standard for Human Resources Contracts (payroll, NDAs, risk prevention), rental contracts, confidentiality agreements, purchase and sale of services, SEPA bank mandates, and logistics (delivery notes).</span></strong></li>\n</ul>","strapi_component":"blog.content-rich-text"},{"id":4229,"text":"<h2><strong>How to obtain and use a recognized electronic signature step by step</strong></h2>\n<p><strong><span style=\"font-weight: 400;\">If your company or you as an individual need to use a qualified electronic signature, the process must follow a strict chain of trust dictated by eIDAS:</span></strong></p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Choose a </strong><a href=\"https://www.tecalis.com/news/qualified-trust-services-provider-qtsp-european-union-eidas\" target=\"_blank\" rel=\"noopener\"><strong>Qualified Trust Service Provider (QTSP)</strong></a><strong>: </strong><span style=\"font-weight: 400;\">Check the EU Trust List to ensure that the certification authority is authorized to issue qualified certificates.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Certificate Application: </strong><span style=\"font-weight: 400;\">Start the application process for the \"Qualified Electronic Signature Certificate.\" This can be for an individual, a representative of a legal entity, or a company's electronic seal.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https://www.tecalis.com/blog/kyc-spain-regulation-digital-solutions-aml-compliance\" target=\"_blank\" rel=\"noopener\"><strong>KYC</strong></a><strong> Identification Process</strong><a href=\"https://www.tecalis.com/es/blog/kyc-espana-regulacion-soluciones-digitales-cumplimiento-aml\"><strong>:</strong></a><span style=\"font-weight: 400;\"> Go through the identity validation process. Today, the most advanced solutions allow you to complete this step 100% online using VideoID in just a few minutes, without the need to travel anywhere.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Key Generation and QSCD Device: </strong><span style=\"font-weight: 400;\">Decide whether you will use a local QSCD (smart card/USB) or a cloud-based QSCD (recommended). If you choose the cloud, the provider will generate your keys in a secure HSM and grant you access through two-factor authentication (mobile app, PIN, biometrics).</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Signature Execution: </strong><span style=\"font-weight: 400;\">When signing a PDF document, the signature platform will request your authorization. You will validate the action using your Second Factor Authentication (2FA). The system will apply cryptography and stamp a qualified time stamp, generating a document (usually PAdES format for PDF) with immediate legal validity.</span></li>\n</ol>\n<p><span style=\"font-weight: 400;\">The current process has left obsolete card readers and USB tokens behind. Today, cryptographic keys are securely stored on HSM servers in the cloud, allowing users to sign from their smartphones using simple two-factor authentication (2FA).</span></p>","strapi_component":"blog.content-rich-text"},{"id":4230,"text":"<h2><strong>Best practices and recommendations for implementing recognized electronic signatures</strong></h2>\n<p><span style=\"font-weight: 400;\">For companies looking to scale, digitize their document flows, and ensure regulatory compliance worldwide, implementing electronic signatures should not be seen as a simple \"digital patch,\" but as a comprehensive business transformation. Below, we list the best practices in the market:</span></p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Choose comprehensive and certified platforms: </strong><span style=\"font-weight: 400;\">It is essential to have technology providers that offer end-to-end solutions. Leading tools such as </span><a href=\"https://www.tecalis.com/products/electronic-signature\" target=\"_blank\" rel=\"noopener\"><strong>Tecalis Sign</strong></a><span style=\"font-weight: 400;\"> not only allow you to execute recognized and advanced electronic signatures with full legal validity under eIDAS, but also combine </span><strong>digital identity verification (KYC/AML)</strong><span style=\"font-weight: 400;\">, the issuance of qualified certificates in real time, and document orchestration in a </span><strong>single operational flow</strong><span style=\"font-weight: 400;\">. This avoids having to hire three different providers, reducing operating costs and eliminating security gaps in technical integrations.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>API integration: </strong><span style=\"font-weight: 400;\">Choose solutions that have robust RESTful APIs. This allows you to embed the recognized or advanced signature experience directly into your ERP, CRM, or employee portal, making the workflow invisible and automated for your internal teams.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Maximize Operational Efficiency: </strong><span style=\"font-weight: 400;\">Electronic signatures reduce contract cycle times by 80%. Eliminate low-value administrative tasks such as printing, scanning, courier delivery, and physical filing.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Sustainability and ESG Policies: </strong><span style=\"font-weight: 400;\">Going paperless not only saves direct costs, but also dramatically reduces the organization's carbon footprint, aligning the company with the United Nations Sustainable Development Goals (SDGs) on its path to becoming paperless.</span></li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Customer Experience (CX) at the Center: </strong><span style=\"font-weight: 400;\">If you need to issue recognized signatures to external customers, make sure that </span><em><span style=\"font-weight: 400;\">Cloud Signature</span></em><span style=\"font-weight: 400;\"> technology is responsive and user-friendly (mobile-first). If the signing and registration process is cumbersome, cart or contract abandonment will be imminent. Technology must adapt to the user, not the other way around.</span></li>\n</ul>\n<p><span style=\"font-weight: 400;\">Implementing recognized electronic signatures ensures maximum legal protection for corporations and opens the door to a truly digital, efficient, and globalized economy.</span></p>","strapi_component":"blog.content-rich-text"},{"id":996,"name":null,"description":"<p><strong>Discover how electronic signatures work with Tecalis Sign</strong></p>","button":"Try it for 6 months with no obligation","url":"https://www.tecalis.com/products/electronic-signature","blank":true,"image":null,"strapi_component":"blog.cta"},{"id":36,"title":"Frequently asked questions (FAQs)","list":"<ul>\n<li><strong>Does a recognized electronic signature have the same validity as a paper signature? </strong><span style=\"font-weight: 400;\">Yes. According to Article 25.2 of the eIDAS Regulation, a qualified (recognized) electronic signature has the same legal effect as a handwritten signature.</span></li>\n<li><strong>Do I need a physical USB device to make a recognized signature? </strong><span>Traditionally, yes, but nowadays you can use cloud certificates (Cloud Signature) centralized in secure HSMs, signing from your mobile phone.</span></li>\n<li><strong>Can I insert a scanned image of my signature into a PDF as a recognized signature? </strong><span>No. A scanned image has no legal validity under eIDAS. You must use a certified platform that applies cryptography and time stamps.</span></li>\n<li><strong>What sets Tecalis Sign apart from other platforms? </strong><span>Tecalis Sign combines biometrics, qualified certificates, and eIDAS 2.0 compliance in its own SaaS platform, guaranteeing comprehensive auditing.</span></li>\n</ul>","icon":null,"strapi_component":"blog.list-detail"}],"blog_categories":[{"id":13,"name":"Electronic Signature","url":"electronic-signature"},{"id":24,"name":"Identity Verification","url":"identity-verification"},{"id":14,"name":"Risk Management","url":"risk-management"}],"reading_time":"Reading time: 5 minutes."},"site":{"siteMetadata":{"title":"Tecalis","twitterHandle":"Tecalis"}}},"pageContext":{"id":"Blog-posts_392","title":"Recognized electronic signature: what it is, uses, and recommendations","langKey":"en","location":"https://tecalis.com/blog/recognized-electronic-signature-what-it-is-and-how-it-works","dateFormat":"MMMM D, YYYY","translates":{"en":"/blog/recognized-electronic-signature-what-it-is-and-how-it-works","es":"/es/blog/firma-electronica-reconocida-que-es-y-como-funciona"},"images":{"6a752922-3e94-56bd-8717-b0e9b6d332d1":{"data":{"image":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","placeholder":{"fallback":"data:image/png;base64,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"},"images":{"fallback":{"src":"/static/fbcf933dc228067a4466aaf63c5c1cd7/59ffd/validacion_documento_identidad_interior_1_5_1_378fe80c8c.webp","srcSet":"/static/fbcf933dc228067a4466aaf63c5c1cd7/7b6bd/validacion_documento_identidad_interior_1_5_1_378fe80c8c.webp 350w,\n/static/fbcf933dc228067a4466aaf63c5c1cd7/aa5f2/validacion_documento_identidad_interior_1_5_1_378fe80c8c.webp 512w,\n/static/fbcf933dc228067a4466aaf63c5c1cd7/806ca/validacion_documento_identidad_interior_1_5_1_378fe80c8c.webp 520w,\n/static/fbcf933dc228067a4466aaf63c5c1cd7/59ffd/validacion_documento_identidad_interior_1_5_1_378fe80c8c.webp 572w","sizes":"(min-width: 572px) 572px, 100vw"},"sources":[]},"width":572,"height":315}}}}},"dabc7d83-1928-5a9f-b5b7-3e11c2bb9e2b":{"data":{"image":{"childImageSharp":{"gatsbyImageData":{"layout":"constrained","placeholder":{"fallback":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAIAAADwazoUAAAACXBIWXMAAAsTAAALEwEAmpwYAAACYklEQVQoz02NXU/TYBiG+ws89q8Y/QMemHjiuUca4YCgGA8kYVGjIaBBIEZkbA7mUDEDEZAAiwLKADe2jq5Aadeydayj32+/1759zTAkXsn9HN3X/WAIoTAMzy+CFwRBAMNQatSJYmE/n5OrDBB4z3H8IHBdD12A/ZPDMPQ8z7LbWOdBCA3c77x6+dLD61dmI12Dt29mZj8Dx6Vopj0c/icjhCzb1gFQNR2YhiQrxVL53dBQvONW/vXj9Ive3hvXCstpxXSOqGMFmJbrQRhiEIatlu+6rg6ApgPHdTnu5OvsQjq9MD6RzCZG5p/1ZJaWDube88WsoGgkWWbYCstx1RqPaTpQVE2UJMMwTMvyfD+/m5uMTX1bXJ1bXJtPTv2c+0JVBVlWJEmSFJU/FSRVU1RN1TRMUVRJknm+poP2W8d1tza3YtFELJrIl6iVtY29EinImmrauu0qmi6IsmrattcKEcIM05Jkpc7XdWBYti2KYiazPjo8NvxqZHsnRzC14gHD1ZuyZqiGpWh6Q5QkrV31A4jxtVqFoSs0TVMUyzCFXO5D8lOk7/ngwEjm+xK1s0HTHFVtqpbrQARM87QpnqkAmHbLD7AjAicKOYrAKZLgWLa8T0xOJOLx1ExsYmOsfzf6cj39cfXHJo6Xtrb//PqdbTRFy/Ecz3O9FsYckiS+d0zuE8U9mqkc05WV5ZXk5PRAX+TJg+57dzq7ux6l+iN44g0eH29qwHbcIIAwhAGEmHQmHJTachkvcCfVCndSYdhUauZuR8/Twbej0eksftgQmhzLqo0GQshr+S2/rUMI/wIjbysFPqO5cwAAAABJRU5ErkJggg=="},"images":{"fallback":{"src":"/static/45ed22a9ebc68031bcaf1aa165360b89/59ffd/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.webp","srcSet":"/static/45ed22a9ebc68031bcaf1aa165360b89/7b6bd/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.webp 350w,\n/static/45ed22a9ebc68031bcaf1aa165360b89/aa5f2/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.webp 512w,\n/static/45ed22a9ebc68031bcaf1aa165360b89/806ca/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.webp 520w,\n/static/45ed22a9ebc68031bcaf1aa165360b89/59ffd/validacion_documentos_identidad_interior_2_1_b2a5ec0e03.webp 572w","sizes":"(min-width: 572px) 572px, 100vw"},"sources":[]},"width":572,"height":315}}}}}},"advertisements":{},"advertisementsForms":{},"ctas":{},"videos":{},"cookies":true}},
    "staticQueryHashes": ["1208480927","235538228","2927780632","3803179178","536423426","63159454"]}