• Report an IT Security Incident
  • Request Help
  • Help & Support
    • Working/Learning Remotely
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Pilot Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Projects & Project Management
    • Technology Investment Request Lifecycle
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Working/Learning Remotely
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Pilot Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Projects & Project Management
    • Technology Investment Request Lifecycle
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Guidance for the Use of Electronic (Digital) Signatures at Mason

Guidance for the Use of Electronic (Digital) Signatures at Mason

The Code of Virginia and federal law, including the Family Educational Rights and Privacy Act, permit the use of electronic signatures on contracts; however, such signatures must be unique and verifiable as they demonstrate each party’s intention to be bound to the contract terms. If electronic signatures are to be used, both parties should agree that digital or electronic signatures are acceptable, and it should be explicitly stated and agreed to in the contract language.

Contracts with External Parties

Contracts with external parties and agreements committing university funds require a high level of authentication with an appropriate audit trail. There are a limited number of university employees with signature authority for these types of transactions. Electronic signatures for these cases are acceptable if the authorized party has a valid personal digital certificate, which is an electronic file used to prove that a document or email was signed by that individual. Mason’s preferred digital signature service is DocuSign and more information on DocuSign at Mason may be found here.

Additionally, submission of grant proposals often requires signatures on: cover letters to sponsors, Federal SF 424 application forms, non-federal application forms, representations and certifications, assurances, budgets, and confirmation of Authorized Organization Representative support. These signatures require university authorization/delegation as they bind the university to terms and conditions or make representations about the university. Electronic signatures for these cases are acceptable if the authorized party has a valid personal digital certificate from an approved certificate authority.

Certain post-award actions, such as prior approval requests or modifications, may require a signed request from the Authorized Organizational Representative. Further, some sponsor-required financial reports, submitted quarterly, semi-annually, or annually also require signatures. These post-award actions where the signature is certifying approval or university-approved requests may also use electronic signatures if the authorized party has a valid personal digital certificate from an approved certificate authority.
Certain documents such as lease agreements and other documents that must be notarized require actual “wet” signatures.

A simple scanned image of your signature or an electronically signed document (e.g., using Adobe Acrobat) that is not tied to a valid personal digital certificate are not acceptable substitutes for a wet signature.

Internal University Documents

Acceptance of signatures on documents supporting internal processes between Mason offices and employees is determined by the responsible office. DocuSign digital signatures are preferred though departments may consider Adobe Acrobat stamp signatures and documents that are signed, scanned, and transmitted via a gmu.edu email address and email confirmation from a gmu.edu email address. At least one of the parties should retain the accompanying email thread for future reference and additional evidence of approval.

Electronically routing forms for approval in workflow applications is an acceptable method if the signing parties are individually authenticated using Mason accounts, and the actions are logged within the system. Examples include travel expense approvals, Banner workflow, Dynamic Forms, and similar applications in which a copy of the document and approval steps remain within the system.

Last modified: December 6, 2021

Last modified: December 7, 2021

Previous

How do I request a service?

Next

How do I safely browse the internet?

Related articles

  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • If I use the VPN and remote into my work computer, how will the screensaver lock affect my telework?
  • What should I do to use 2FA if I get a new smartphone?
  • What is email phishing?
  • Get Started With 2FA Checklist

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

Read More

Quick Links

Patriot Pass Password Reset
Submit a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

Read More

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

© 2022 George Mason University
4400 University Drive
Fairfax, Virginia 22030

ITS Support Center
703-993-8870
support@gmu.edu
live chat
@GeorgeMasonITS
Innovation, Room 226
Hours of Operation

Monday – Thursday, 8 a.m. – 9 p.m.
Friday, 8 a.m. – 5 p.m.
Saturday, Closed
Sunday, 1 p.m. – 9 p.m.
(closed Thursday 3 p.m. – 4 p.m. for a team meeting)

  • Webmaster