E-signature levels explained
An electronic signature is any electronic method that indicates intent to sign a document. In practice, “levels” describe how strong the identity assurance and tamper protection are, and how easy it is to prove who signed what and when.
Common levels (simple → qualified)
- Simple electronic signature (SES): basic “click to sign”, typed name, or drawn signature, often with email verification.
- Advanced electronic signature (AES): stronger link to the signer + controls to detect changes, often with identity checks and cryptographic sealing.
- Qualified electronic signature (QES): highest level, based on qualified certificates and qualified trust services, designed for strong legal effect and evidentiary strength.
Qualified vs simple: the real differences
The practical difference is not “digital vs not digital.” It’s about how convincingly you can demonstrate: (1) signer identity, (2) signer intent, (3) document integrity, and (4) a reliable timestamp.
| Factor | Simple e-signature (SES) | Qualified e-signature (QES) |
|---|---|---|
| Identity assurance | Lightweight (email/SMS/login), depends on configuration. | High (formal identity verification + qualified certificate). |
| Integrity / tamper evidence | Varies by provider; may rely on audit logs + PDF sealing. | Strong cryptographic protections designed for non-tampering. |
| Legal strength & acceptance | Often accepted for many contracts, but disputes rely on evidence quality. | Designed for strongest recognition in frameworks like eIDAS; closer to “handwritten” equivalence in many cases. |
| User experience | Fastest (seconds/minutes). | Heavier (identity steps, device/app requirements, higher friction). |
| Cost | Lower. | Higher (trust services, certificates, verification). |
Which level to use (by use case)
The right level depends on (a) required legal form, (b) financial or reputational risk, (c) dispute likelihood, and (d) how many signatures you need at scale.
Typical guidance (practical, not legal advice)
- Use simple e-signature (SES) for low-to-medium risk agreements where speed matters (standard NDAs, many internal approvals, routine vendor documents).
- Use advanced e-signature (AES) when you need stronger identity + integrity but want less friction than qualified (procurement contracts, customer contracts with moderate risk).
- Use qualified e-signature (QES) for high-stakes or strict-form scenarios, or where you expect disputes and need maximum evidentiary strength.
Decision matrix (quick)
| Question | If “Yes” → lean toward |
|---|---|
| Is this a high-value / high-liability agreement? | AES or QES |
| Is there a strict written-form requirement in your jurisdiction? | QES (verify legally) |
| Is dispute likelihood high (employment, IP, sensitive data)? | AES or QES |
| Is completion rate critical (sales, onboarding, scale)? | SES or AES |
| Do you need cross-border EU recognition at the highest level? | QES (verify requirements) |
Implementation tips (process + controls)
If you want signatures to “hold up,” focus on evidence and governance. The signature type is only one part of the system.
Build a strong evidence package
- Authentication: define acceptable methods (SSO, SMS, ID verification) based on risk.
- Signer intent: clear consent screens and explicit “sign” action.
- Integrity: cryptographic sealing / tamper detection for signed documents.
- Audit trail: IP/device info (where allowed), timestamps, event logs, and document hash.
- Retention: store the signed artifact + evidence in a central contract repository.
Helpful tools (optional)
If you need signing workflows with tracking and auditability, these tools can support implementation:
Disclaimer: Links are for convenience; choose tools based on your requirements and compliance needs.
Selection checklist (copy/paste)
Use this checklist to choose the right e-signature level and avoid compliance or adoption issues.
- We confirmed whether any document types require a specific legal form in our jurisdiction.
- We defined 2–3 approved signature levels (SES/AES/QES) and mapped contract types to each level.
- We aligned on signer identity requirements (SSO/SMS/ID verification) per risk level.
- We validated document integrity controls (sealing, tamper evidence, hashing).
- We ensured audit trails capture key events (sent, viewed, signed, completed) with timestamps.
- We defined retention rules and storage location (central repository + permissions).
- We tested the signing UX (completion rate, mobile usability, edge cases).
- We documented the policy and trained teams (procurement, HR, sales, legal).
FAQ
What is a qualified e-signature?
Is a simple e-signature legally valid?
When should we use qualified instead of simple?
What matters most in an e-signature setup?
Sources & further reading
Use authoritative references and adapt to your jurisdiction (Switzerland/EU/global).
- European Commission – eIDAS / trust services overview
- EU Regulation (eIDAS) No 910/2014
- NIST – security & identity guidance (reference)
- ISO/IEC 27001 – Information Security Management
- ISO/IEC 38500 – Governance of IT
Last updated: February 21, 2026 • Version: 1.0