Thursday, May 25, 2017

Word of the Day: voice signature

Word of the Day WhatIs.com
Daily updates on the latest technology terms |May 25, 2017
voice signature

A voice signature is a type of electronic signature that uses an individual's recorded verbal agreement in place of a handwritten signature. It is considered legally binding in both the private and public sectors under certain conditions. A voice signature may also be referred to as a telephonic signature.

During the contracting phase of a telephone transaction, a company can use biometrics software to record a customer approving a transaction. The recording is used to create a unique voiceprint, which is comparable to a fingerprint or retina, as no two voices are the same. Once a voiceprint has been collected, it can be used to validate a person's identity on later phone calls.

Under the Electronic Signatures in Global and National Commerce (ESIGN) Act and common law in the United States, voice signatures are legally enforceable with the addition of certainty of terms. The certainty of terms documents that both contracting parties accept "I Agree" statements. In order to be binding, the voice signature needs to be attached to the contract. A standard solution is to embed the digital voice recording in the contract and use encryption to prevent the files from being disassociated or altered.

Voice signatures benefit organizations by increasing conversion rates compared to conventional in-person, ink-to-paper methods. They can eliminate the long process that usually involves printing, distributing and waiting for the returned signed documents. In turn, organizations see real increases in customer service quality, levels of data security and conversion rates.

In the United States, voice signatures have played an important part in the implementation of the Affordable Care Act (ACA). Telephonic applications and signatures are accepted for coverage through the Health Information Exchange (HIE), Medicaid and Children's Health Insurance Plan (CHIP) programs across the United States. Under the law, however, collection and storage of voice signatures can vary from state to state.

Unfortunately, voice signatures can be misused with potentially negative consequences. An example is the can you hear me telephone scam where the victim is recorded answering "yes" to a question that will most likely be answered affirmatively. The affirmative response is then butt spliced to another audio file and used as a voice signature to authorize charges without the victim's knowledge.

To avoid becoming the victim of voice signature scams, the United States Federal Trade Commission (FTC) offers mobile and landline phone customers the following advice:

  • Hang up immediately if a call begins "Can you hear me?"
  • Be suspicious of robocalls.
  • When speaking to an unfamiliar caller, be alert for any question that prompts the answer "yes."
  • Check bank, credit card and cell phone bill statements regularly for unauthorized charges.
  • Ignore incoming phone calls from unfamiliar numbers.
  • Do not return missed calls from unfamiliar numbers.
  • Report suspicious calls to the Better Business Bureau and/or FTC hotlines.
  • Consider joining the Do Not Call Registry.

Quote of the Day

"Voice has been around awhile. When you call into a call center, there is a good possibility that your voice is being evaluated for antifraud purposes." - Brendon Wilson

 

Trending Terms

can you hear me?
Electronic Signatures in Global and National Commerce Act
biometric verification
voiceprint
biometrics
encryption

 
Learning Center

Barclays replaces passwords with voice authentication
A new voice authentication system has been rolled out at financial services firm Barclays and will replace customer passwords with voiceprints.

Mobile endpoint security: What enterprise infosec pros must know now
Achieving mobile endpoint security can be tough. This essential guide walks security pros through its many aspects.

What's next for mobile biometrics
Mobile biometrics can authenticate users based on their fingerprint, iris and more, allowing mobile IT admins to bypass hated password or PIN requirements.

How mobile biometrics can strengthen security
Mobile biometrics, such as iris and facial scanning, is making its way into the enterprise, and is poised to replace usernames and passwords.

Learn about user authentication methods, from passwords to biometrics
The password might not be dead but that doesn't mean it's working. This guide looks at how other user authentication methods can supplement it.

Writing for Business

The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer

 

 

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

No comments: