IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Electronic Notarization Needed To Prevent and Detect Identity Fraud

Notaries are one of the most powerful weapons we have against the ever-increasing onslaught of identity crimes

A recently published White Paper, prepared by a Massachusetts Institute of Technology professor, is calling for quick action by government, industry and professional associations to provide a "sound strategy" for e-notarization to help stem the rising tide in forgeries and frauds in identity, mortgage and even immigration transactions. The paper reveals the importance of providing secure authentication and effective electronic transactions for e-commerce in the burgeoning digital age.

In the White Paper, "Electronic Notarization: Why It's Needed, How It Works, And How It Can Be Implemented To Enable Greater Transactional Security," published by the National Notary Association, Daniel J. Greenwood, Director of MIT's E-Commerce Architecture Program, outlines the legal and technological issues that must be addressed to ensure convenient and secure e-commerce in an era of rising document forgery and identity fraud.

Such crimes interfere with the orderly conduct of business and threaten individual property rights. It is in the interest of business and government to implement systems that protect these rights. The Notary Public, charged with positively identifying individuals during such sensitive transactions as purchasing a home, serve to shield the public from insidious identity and document schemes.

"As a society, we may never be able to stop criminals from obtaining fraudulent identification documents, but Notaries can pose a formidable obstacle and deterrent to these criminals and provide an independent record that may be the only evidence prosecutors have to convict a forger," Greenwood writes. "Indeed, in protecting our identities from misappropriation, Notaries are one of the most powerful weapons we have against the ever-increasing onslaught of identity crimes."

Many paper-based transactions, from real estate conveyances to international adoptions to last wills and testaments, are notarized in order to prevent, detect and prosecute fraud. As government agencies and industry move toward a complete paperless workflow, electronic documents will need to receive the same level of security as their paper counterparts. However, Greenwood warns that laws and regulations to guide Notaries in the performance of electronic notarizations are lacking and must be immediately addressed to ensure the protection of property rights in the 21st century.

"Those who regulate Notaries Public would be derelict in their duty if they failed to effect the rule-making necessary to transition to a reliable system of e-notarization," Greenwood writes. "Failing to exercise oversight and control in this area would be akin to failing to provide and enforce safety rules for hydrogen or hybrid cars because the new technology is different from the old."

Greenwood emphasizes the need for more uniform laws to "ensure that consistent and harmonious national infrastructures develop" and interstate commerce is not adversely affected.

In response to this legislative need, as described in the research, the National Notary Association has published the Model Notary Act (2002), a model statute that "integrates paper-based and electronic procedures and contains the first comprehensive set of rules for registering electronically-capable notaries and regulating their electronic acts."

"It is essential to inform government, law enforcement and industry leaders of the need for regulated electronic notarization to best protect consumers against forgery in e-commerce," said Timothy S. Reiniger, Vice President and Executive Director of the NNA. "Mr. Greenwood and the Massachusetts Institute of Technology have done an invaluable service in drafting this important document."

The White Paper is available online at the NNA's Web site, www.Nationalnotary.org.
Special Projects
Sponsored Articles
  • Sponsored
    Smart cities could transform urban living for the better. However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and mobile edge computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure.
  • Sponsored
    How the convergence of security and networking is accelerating government agencies journey to the cloud.
  • Sponsored
    Microsoft Teams quickly became the business application of choice as state and local governments raced to equip remote teams and maintain business continuity during the COVID-19 lockdown. But in the rush to deploy Teams, many organizations overlook, ignore or fail to anticipate some of the administrative hurdles to successful adoption. As more organizations have matured their use of Teams, a set of lessons learned has emerged to help agencies ensure a successful Teams rollout – or correct course on existing implementations.
  • Sponsored
    Five Key Criteria for Selecting the Right Technology Solution for Communications and Notifications