• Live Chat
  • Report an IT Security Incident
  • Request Help
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins
George Mason University
  • Live Chat
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins

How can ITS help you?

Our services are designed to help you succeed at Mason—
search our services, knowledge articles, how to guides, FAQs, and more.

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Guidance for the Use of Electronic (Digital) Signatures at Mason

Guidance for the Use of Electronic (Digital) Signatures at Mason

The Code of Virginia and federal law, including the Family Educational Rights and Privacy Act, permit the use of electronic signatures on contracts; however, such signatures must be unique and verifiable as they demonstrate each party’s intention to be bound to the contract terms. If electronic signatures are to be used, both parties should agree that digital or electronic signatures are acceptable, and it should be explicitly stated and agreed to in the contract language.

Contracts with External Parties

Contracts with external parties and agreements committing university funds require a high level of authentication with an appropriate audit trail. There are a limited number of university employees with signature authority for these types of transactions. Electronic signatures for these cases are acceptable if the authorized party has a valid personal digital certificate, which is an electronic file used to prove that a document or email was signed by that individual. Mason’s preferred digital signature service is DocuSign and more information on DocuSign at Mason may be found here.

Additionally, submission of grant proposals often requires signatures on: cover letters to sponsors, Federal SF 424 application forms, non-federal application forms, representations and certifications, assurances, budgets, and confirmation of Authorized Organization Representative support. These signatures require university authorization/delegation as they bind the university to terms and conditions or make representations about the university. Electronic signatures for these cases are acceptable if the authorized party has a valid personal digital certificate from an approved certificate authority.

Certain post-award actions, such as prior approval requests or modifications, may require a signed request from the Authorized Organizational Representative. Further, some sponsor-required financial reports, submitted quarterly, semi-annually, or annually also require signatures. These post-award actions where the signature is certifying approval or university-approved requests may also use electronic signatures if the authorized party has a valid personal digital certificate from an approved certificate authority.
Certain documents such as lease agreements and other documents that must be notarized require actual “wet” signatures.

A simple scanned image of your signature or an electronically signed document (e.g., using Adobe Acrobat) that is not tied to a valid personal digital certificate are not acceptable substitutes for a wet signature.

Internal University Documents

Acceptance of signatures on documents supporting internal processes between Mason offices and employees is determined by the responsible office. DocuSign digital signatures are preferred though departments may consider Adobe Acrobat stamp signatures and documents that are signed, scanned, and transmitted via a gmu.edu email address and email confirmation from a gmu.edu email address. At least one of the parties should retain the accompanying email thread for future reference and additional evidence of approval.

Electronically routing forms for approval in workflow applications is an acceptable method if the signing parties are individually authenticated using Mason accounts, and the actions are logged within the system. Examples include travel expense approvals, Banner workflow, Dynamic Forms, and similar applications in which a copy of the document and approval steps remain within the system.

Last modified: June 11, 2023

Previous

What is a mobile computing platform?

Next

Application Restrictions – TikTok, WeChat, etc.

Related articles

  • How do I secure my computer?
  • What university policy governs permission to access or store Highly Sensitive Data?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data be protected by encryption?
  • What are some examples of encryption “in transport?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

READ MORE

Quick Links

Patriot Pass Password Reset
Create a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

READ MORE

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

I T S Logo

© 2024 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Follow Us
location pin for in-person IT support   @GeorgeMasonITS
location pin for in-person IT support   @georgemasonits
ITS Support 24/7
   703-993-8870
   Live Chat
  • Webmaster