Browse Definitions:
Definition

voice signature

Contributor(s): Kaitlin Herbert

A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature. It is considered legally binding in both the private and public sectors under certain conditions. A voice signature may also be referred to as a telephonic signature.

During the contracting phase of a telephone transaction, a company can use biometrics software to record a customer approving a transaction.  The recording is used to create a unique voiceprint, which is comparable to a fingerprint or retina, as no two voices are the same.  Once a voiceprint has been collected, it can be used to validate a person’s identity on later phone calls.

Under the Electronic Signatures in Global and National Commerce (ESIGN) Act and common law in the United States, voice signatures are legally enforceable with the addition of certainty of terms. The certainty of terms documents that both contracting parties accept  “I Agree” statements. In order to be binding, the voice signature needs to be attached to the contract.  A standard solution is to embed the digital voice recording in the contract and use encryption to prevent the files from being disassociated or altered.  

Voice signatures benefit organizations by increasing conversion rates compared to conventional in-person, ink-to-paper methods. They can eliminate the long process that usually involves printing, distributing and waiting for the returned signed documents. In turn, organizations see real increases in customer service quality, levels of data security and conversion rates.

In the United States, voice signatures have played an important part in the implementation of the Affordable Care Act (ACA). Telephonic applications and signatures are accepted for coverage through the Health Information Exchange (HIE), Medicaid and Children’s Health Insurance Plan (CHIP) programs across the United States. Under the law, however, collection and storage of voice signatures can vary from state to state.

Unfortunately, voice signatures can be misused with potentially negative consequences. An example is the can you hear me telephone scam where the victim is recorded answering "yes" to a question that will most likely be answered affirmatively. The affirmative response is then butt spliced to another audio file and used as a voice signature to authorize charges without the victim's knowledge.

To avoid becoming the victim of voice signature scams, the United States Federal Trade Commission (FTC) offers mobile and landline phone customers the following advice:

  • Hang up immediately if a call begins "Can you hear me?"
  • Be suspicious of robocalls.
  • When speaking to an unfamiliar caller, be alert for any question that prompts the answer "yes."
  • Check bank, credit card and cell phone bill statements regularly for unauthorized charges.
  • Ignore incoming phone calls from unfamiliar numbers.
  • Do not return missed calls from unfamiliar numbers.
  • Report suspicious calls to the Better Business Bureau and/or FTC hotlines.
  • Consider joining the Do Not Call Registry.
This was last updated in March 2017 ???publishDate.suggestedBy???

Continue Reading About voice signature

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you use voice signatures in your organization?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close