Skip to main content

Why impartial systems matter when they sit between you and your client

Feb 17, 2026 11:34:42 AM

14 min read

Illustration showing a law firm and client connected through a shared, tamper-evident electronic signature audit trail document

Written on: Feb 17, 2026 11:34:42 AM

Read time: 14 min read

Written by: Chris Fortune

Tags : e-signatures Future of agreements Trust & transparency

When technology becomes the bridge between a firm and its client, it stops being just a tool. It becomes the record.

That shift matters because, in a dispute, complaint, or regulatory review, the central question is rarely “did they click sign?”. It is “what happened, what was shown, and can both sides trust the evidence?”. In the UK, the legal framework supports the admissibility of electronic signatures, but the evidential weight you can attach to your process depends heavily on how your audit trail is created, protected, and governed.

This blog takes a technology-first look at impartiality: why the most trusted customer-facing systems are designed so that neither side can easily rewrite history, and why the same logic should apply to e-signatures and “evidencing informed consent” in law firm workflows.

What this blog contains

When the bridge becomes the record

Impartiality, in this context, does not mean “perfect neutrality” in a philosophical sense. It means something more operational and testable:

  • Neither party should be able to unilaterally alter the record without leaving evidence that alteration occurred.

  • Both parties should be able to rely on the same core facts (timestamps, version history, actions taken, and what was presented).

  • The system should be designed for scrutiny: complaints handlers, regulators, and courts should be able to follow the trail without having to “trust the author”.

This is not abstract. In UK legal services complaints, the record is often compiled and tested through an “evidence from both sides” process. The Legal Ombudsman describes an in-depth investigation as one where evidence is submitted by both the consumer and the service provider, reviewed, and then findings are shared with both parties (with escalation routes if either side disputes the findings).

That process implicitly assumes something important: if the matter escalates, your internal notes and your internal system logs are not automatically treated as the final truth. They become inputs into a shared evidential narrative. And in that environment, systems that look like “marking your own homework” create avoidable friction even when everyone acted in good faith.

Neutral bridges you already rely on

If you zoom out, you can see that customer-facing technology often becomes trustworthy because it is built as a mediator between parties with different incentives. The platform’s role is not just to transact, but to make transactions auditable.

Payments as neutral bridges

In card payments, the merchant does not simply log “paid” in its own database and treat that as conclusive proof. Payment disputes are handled through structured processes that involve the customer’s bank or lender, card schemes, and evidence from the parties.

The Financial Ombudsman Service explains that a chargeback allows a consumer to challenge and “claw back” card payments in certain circumstances, and that the bank or lender will ask for supporting evidence before starting the process. It also notes that different card schemes have different rules (with consumers directed back to their provider for scheme specifics).

From the merchant side, marketplace guidance makes the neutrality even clearer. eBay explains that, when a buyer opens a payment dispute, the seller can accept or challenge the dispute by submitting supporting evidence, and that the final outcome is decided by the buyer’s payment institution (not by the seller).

In other words: the most consequential part of the system is not the “pay” button. It is the independently reviewable record that supports dispute resolution.

Marketplaces and platform dispute systems

Marketplaces are a strong analogy for legal client journeys because the platform typically sits between parties who may later disagree about what happened. The platform therefore standardises what counts as evidence and sets timeframes, appeal routes, and verification steps.

Amazon’s UK help pages for A-to-z Guarantee refunds highlight a familiar pattern: if a refund request is denied, a customer can appeal within a specified period, and the appeal process asks customers to compile supporting evidence such as receipts, proofing documents, and tracking details.

Meanwhile, eBay’s Money Back Guarantee documentation describes how it verifies delivery or collection and how it may ask for additional documentation on appeal. It also describes evidence requirements around tracking that can be independently validated and, for higher-value items, signature confirmation requirements.

The key point for law firms is not the consumer retail detail. It is the design principle: when disputes are foreseeable, the platform becomes credible by making evidence requirements explicit and by keeping a record that is not solely controlled by one side.

Identity verification and onboarding tech

Client onboarding is another “bridge” moment. It is also one of the clearest examples of why impartiality is baked into compliance design.

UK AML identity verification is framed around the idea that verification should be based on documents or information from a reliable source that is independent of the person whose identity is being verified. HMRC’s Economic Crime Supervision Handbook explicitly reflects this “independent source” concept when explaining what “verify” means under the UK AML regime.

The Solicitors Regulation Authority also communicates to consumers that many firms may use trusted third-party providers to verify identity or source of funds digitally.

Separately, the UK government’s digital identity programme makes the same architectural point: services can become independently certified against a trust framework to demonstrate they follow the rules. The Department for Science, Innovation and Technology describes this explicitly: digital identity and attribute services can become independently certified against the UK digital identity and attributes trust framework.

Across payments, marketplaces, and onboarding, impartiality is not a moral statement. It is a practical response to one reality: when incentives diverge, you need a record that both sides can trust.

What a tamper proof audit trail actually means

“Audit trail” is often used loosely. In practice, there is a difference between:

  • a log (a record of events), and

  • a tamper-evident audit trail (a record of events designed so that unauthorised manipulation is detectible, and the record remains useful under scrutiny).

Security standards and public-sector guidance consistently treat logs as evidence assets, not convenience data. For example, the UK government’s service design guidance on logging states that products should store logs proportionately and ensure the confidentiality, integrity, and availability of logs. It also links logging expectations to broader security monitoring requirements.

Similarly, the UK data protection regulator’s guidance on logging stresses that auditable logs are important for accountability and that logs must be kept safe and secure, particularly where they may be needed as evidence for investigations.

From a technical perspective, “tamper proof” is rarely literal (all systems can be attacked). What you can realistically engineer is:

  • tamper resistance (it is hard to alter logs), and

  • tamper evidence (if logs are altered, it becomes detectable).

That is why security best practice focuses on protections that make undetected log manipulation difficult. Public cybersecurity guidance explicitly recommends protecting logs from tampering so you can be confident they accurately represent what happened.

In technical controls, this often translates into a handful of repeatable design patterns:

  • Strong time integrity, so timestamps are consistent and defensible over time (including time zone clarity and trusted time-stamping approaches where appropriate). 

  • Cryptographic integrity, where log files or audit records are hashed and/or digitally signed so alterations are detectable. A practical example is AWS’s description of CloudTrail log file validation, which uses hashing and digital signing to help determine whether a log file was modified after delivery.

  • Separation of duties, where administrators who operate a system cannot quietly rewrite the evidence the system produces (or at least cannot do so without leaving a trace). This is a governance point as much as a technology one.

  • Lifecycle and retention controls, so records are retained for appropriate periods and can be produced during investigations. Log management guidance (for example, in NIST publications) positions auditing and logging as part of detecting violations and supporting investigations.

For digital signatures specifically, tamper-evidence is also embedded in the underlying standards. For example, advanced electronic signatures under UK eIDAS are described as needing to be uniquely linked to the signer and capable of detecting changes to the signed data after signing.

The takeaway for law firms is simple: if your “audit trail” is just a database row that says “signed=true”, you may have a workflow marker, but you are unlikely to have a record that stands up well when the other side challenges it.

Proving electronic signature in court

UK law and guidance give two consistent messages about electronic signatures:

  • Electronic signatures should not be dismissed just because they are electronic.

  • Whether a method is legally effective is not the same as the evidential weight it will carry.

At the legislative level, eIDAS Article 25 sets out that an electronic signature must not be denied legal effect and admissibility as evidence solely because it is in electronic form (and it sets out the equivalence of qualified electronic signatures to handwritten signatures).

Within UK law, section 7 of the Electronic Communications Act 2000 provides that electronic signatures (and related certifications) are admissible in evidence in relation to questions of authenticity and integrity of the communication or data.

Authoritative legal sector guidance reinforces this. The Law Society of England and Wales’s Q&A on electronic signatures states that electronic signatures are valid under English law and admissible in evidence, and it emphasises that, while methods can be legally effective, parties should consider the evidential weight of a particular method in demonstrating the signatory’s intention to authenticate.

The Law Commission’s electronic execution project similarly concludes that electronic signatures are capable in law of executing documents (including deeds) provided the signer intends to authenticate and any relevant formalities are satisfied.

Case law discussions in practitioner guidance repeatedly turn on intention and authentication. For example, commentary on Neocleous v Rees explains that an automatically applied email footer name can amount to a signature for statutory purposes where it is applied with authenticating intent.

Similarly, legal sector and international commentary on Golden Ocean Group v Salgaocar describes how a series of emails can constitute a “document” and that email sign-offs can satisfy signature requirements, again turning on the question of authentication and intention.

For law firms, one of the most concrete “UK in practice” illustrations of what regulators and registries want to see comes from land registration. HM Land Registry’s Practice Guide 82 sets out forms of electronic signature it can accept and describes controlled signing processes that include platform access steps, OTPs, and automatic recording of dates and times within the platform’s audit trail in certain flows. 

The implication is not that every law firm engagement letter needs Land Registry-level ceremony. The implication is that, where the stakes are high (property is a good example), the UK ecosystem expects the platform to do more than capture a scribble or a click. It expects a process that can be evidenced.

Risk of in house e signature system

The “risk of in house e signature system” is not primarily that the system will be dishonest. In most firms, it will not be.

The risk is that, when something goes wrong and scrutiny arrives, the firm is in the position of saying:

  • we built the journey

  • we generated the document

  • we stored the only audit trail

  • we control who can access, export, or delete it

  • and our administrators can potentially alter the underlying records

Even if your controls are strong, the structure creates a perceived conflict: the party with exposure also controls the proof.

This is the same reason AML verification is framed around independent sources. HMRC’s guidance on verification explicitly anchors “verify” to documents or information obtained from a reliable source independent of the person. The value is not only accuracy; it is defensibility when challenged. 

It is also why modern security guidance treats logs as evidence assets and emphasises protecting logs from tampering. If logs can be quietly edited, they lose much of their investigative value. 

In the legal services world, scrutiny is not hypothetical. Complaint volumes and investigation intensity shape what “good records” look like. The Legal Ombudsman’s recent quarterly data highlights both the rising demand on its service and that poor communication and delay/failure to progress make up a large portion of complaint types accepted. For firms, this matters because service issues often turn into evidence disputes: what was explained, what was promised, and what was sent. 

Now apply that to a signing and consent flow. If the core audit trail exists only inside your own systems, the other party may reasonably argue that they are being asked to accept evidence that the firm could theoretically rewrite. That argument can prolong disputes and raise the temperature of complaints.

By contrast, in customer-facing systems that are designed for disputes, the “bridge” is designed so evidence can be independently reviewed. For example, eBay is explicit that the final outcome of payment disputes is decided by the payment institution, and that evidence is sent to that external institution. 

So the practical recommendation for law firms is not “never build anything in house”. It is: do not build the evidential core of consent and execution in a way that makes you the sole custodian of the truth.

This is where the discussion moves beyond signatures.

An “electronic signature audit trail UK” conversation is often focused on authenticity: who signed, when, and whether the document was altered after signing. But “evidencing informed consent” adds another layer: whether the client was put in a position to understand what they were agreeing to.

UK consumer law places real weight on transparency. The Consumer Rights Act 2015 requires traders to ensure that written terms and consumer notices are transparent. 

The Competition and Markets Authority’s guidance on unfair contract terms has long treated transparency and fairness as linked concepts, and it remains active in this area (including current consultation activity on revised guidance). 

For law firms, informed consent also overlaps with professional expectations around client care communications. The Law Society’s client information requirements practice note sets out expectations about the information firms need to give clients, and the SRA Transparency Rules require firms to publish information on complaints handling procedures (including how and when a complaint can be made to the Legal Ombudsman and to the SRA). 

Why does this matter for an e-signature platform?

Because when a client later says “I didn’t understand that term” or “I didn’t realise that applied to me”, the dispute is no longer just about the validity of the signature. It is about the fairness and clarity of the process that led to agreement.

At that point, the most useful evidence is not only:

  • proof of execution (they signed), but also

  • proof of communication (what they were shown, what they were asked to confirm, and whether the pathway was designed to support understanding).

This is exactly the kind of evidential narrative that emerges in complaints processes where evidence is submitted by both sides and the decision maker tests what is reasonable in the circumstances. 

From a technology design standpoint, this is where impartial systems become a competitive advantage. If the record is built so that:

  • the correct version is provable,

  • the content presented is provable,

  • timestamp integrity is strong,

  • the audit trail is tamper-evident, and

  • both sides can rely on the same facts,

… then you reduce friction when disagreements arise. The system does not “take sides”; it produces a record that stands on its own.

That framing also explains why trust services exist. UK eIDAS concepts such as electronic time stamps and electronic registered delivery services are explicitly about providing evidence that data existed at a particular time, or that it was sent and received, and that it was protected against unauthorised alterations. 

So, if you believe “the evidence belongs to both sides”, the natural conclusion is that your consent infrastructure should behave like other customer-facing bridges: impartial enough that the record is trusted even when incentives diverge.

Where i agree fits: in this framing, i agree is not “an alternative way to sign”. It is infrastructure for turning client-facing consent into a defensible, reviewable record that is designed for the moments when it matters most.

References

Illustration showing a law firm and client connected through a shared, tamper-evident electronic signature audit trail document

Written on: Feb 17, 2026 11:34:42 AM

Read time: 14 min read

Written by: Chris Fortune

Tags : e-signatures Future of agreements Trust & transparency