e-Sign Pk Policy

Bizoso Consulta Pakistan E-Signature Policy
Effective Date: 01 July 2024
Issued by: Bizoso Consulta Pakistan


1. Purpose

This strict E-Signature Policy outlines the mandatory procedures, security measures, and legal requirements for the use of electronic signatures (E-Signatures) within Bizoso Consulta Pakistan. It ensures compliance with the Electronic Transactions Ordinance (ETO), 2002, and establishes guidelines to safeguard the integrity, authenticity, and non-repudiation of electronic documents. IP address verification is required for all E-Signatures to ensure the origin of signatures and strengthen security protocols.


2. Scope

This policy applies to all employees, contractors, clients, and third parties engaging with Bizoso Consulta Pakistan through electronic agreements, contracts, and other legally binding transactions. It is mandatory for all parties to follow this policy when using E-Signatures.


3. Definitions

  • Electronic Signature (E-Signature): As per Section 2(n) of the ETO, an electronic signature is any letters, numbers, symbols, images, or characters electronically attached to or associated with a document, used to authenticate or approve it.
  • IP Address Verification: The capture and logging of the user’s IP address at the time of signing to confirm the signatory’s location and authenticate the origin of the E-Signature.
  • Advanced Electronic Signature: As defined in Section 2(e) of the ETO, it is a unique signature that is verifiable, secure, and linked solely to the signatory.

4. Mandatory Requirement for E-Signature

All electronic signatures must be accompanied by the signatory’s IP address for authentication purposes. This requirement is enforced to ensure that:

  • The IP address serves as a geographical and identity verification tool.
  • The signatory can be traced back to a specific location, further solidifying the legitimacy of the signature.
  • The timestamp of the signature must be logged along with the IP address to meet legal and audit trail requirements.

5. Legal Recognition of E-Signatures (Section 3 & 7 of ETO, 2002)

As per the ETO, 2002, electronic signatures are legally recognized and enforceable. The following rules apply:

  • No E-Signature will be denied legal recognition solely because it is in electronic form.
  • The signature must meet the requirements for an advanced electronic signature (where applicable) and must be verifiable using the signatory's unique credentials, including their IP address.

6. Security and Authentication Measures

Bizoso Consulta Pakistan ensures that all E-Signatures, when used for legal documents or contracts, comply with the following stringent security protocols:

  • IP Address Logging: The IP address of the signatory will be recorded at the time of signing. This information will be stored securely in our systems and used for legal verification purposes if necessary.
  • Two-Factor Authentication (2FA): E-Signatures must be accompanied by two-factor authentication for additional security.
  • Encryption: All electronic documents containing E-Signatures will be encrypted using industry-standard cryptographic methods to prevent unauthorized alterations (as per Section 5 of the ETO).
  • Advanced Electronic Signature: Where applicable, advanced electronic signatures will be issued by an accredited certification service provider, as mandated by Section 24 of the ETO.

7. Retention and Audit Trail

  • All signed electronic documents will be retained in secure storage systems that log the IP address, time of signature, and the integrity of the document.
  • An audit trail will be maintained for each signed document, including:
    • Date and time of signature.
    • IP address of the signatory.
    • Any subsequent alterations or attempts to modify the document (invalidating the signature under Section 9 of ETO).

These records will be accessible for audit or legal purposes and stored for a minimum of [Insert Duration] years.


8. Responsibilities

  • Employees and Signatories: All employees, clients, and third parties must ensure they are using secure internet connections while applying E-Signatures to documents. Misuse of E-Signatures or tampering with authentication measures, such as falsifying IP addresses, will lead to disciplinary action and possible legal consequences under Section 34 of the ETO.
  • Management: The management of Bizoso Consulta Pakistan is responsible for ensuring the proper implementation of this policy, maintaining security protocols, and ensuring compliance with applicable legal standards.

9. Prohibited Practices

The following actions are strictly prohibited:

  • Use of proxy IP addresses or VPNs to disguise the signatory’s real location.
  • Misuse of another individual’s electronic signature or identity.
  • Tampering with electronic documents after signing or altering the audit trail.
  • Failure to follow this policy or any attempts to bypass the IP address logging requirement will result in immediate legal action as outlined in Section 34 of the ETO.

10. Dispute Resolution and Legal Liability

In case of a dispute related to an E-Signature or IP address verification:

  • The Advanced Electronic Signature will be treated as legally binding and authentic unless proven otherwise, as per Section 9(b) of the ETO.
  • Signatories misusing or fraudulently applying E-Signatures will be liable for legal consequences, including imprisonment or fines under Section 34 and Section 35 of the ETO.

11. Governing Law

This policy is governed by the laws of Pakistan, specifically the Electronic Transactions Ordinance (ETO), 2002. Any legal proceedings arising from the use of E-Signatures will be conducted in accordance with these laws.


12. Policy Amendments
Bizoso Consulta Pakistan reserves the right to amend this policy as needed to comply with any updates to the ETO, 2002, or to improve security measures in the use of E-Signatures.


This policy ensures the secure and lawful use of electronic signatures within Bizoso Consulta Pakistan. By incorporating IP address tracking and strict adherence to security measures, it minimizes risks and maintains the integrity of electronic transactions.

Did you find this article useful?