The legal instrument is a legal name used for all formally executed written documents that may be formally attributed to their author Records and formally expresses an enforceable act, procedure or contractual obligation, obligation or any right and therefore proof that the act, trial or agreement.  Examples include a certificate, an act, a contract, a contract, a will, a legislative act, a notarized act, a judicial decision or procedure, or a law passed by a legislative body competent in municipal (national) or international law. Many legal instruments have been written under seal, with a wax or paper seal affixed to the document as proof of its execution and authenticity (which has often eliminated the need for a review in contract law). Today, however, many jurisdictions have had to abolish the requirement that documents be secret to give them legal effects. To address some of these concerns, the U.S. Congress passed the Electronic Signatures in Global and National Commerce Act (P.L. 106-229 2000, 15 USCS, p. 7001), which stated that no court could accept a contract later, simply because it was digitally signed. The law is very permissive, so that, for the most part, any electronic character in a contract is sufficient. It is also quite restrictive in that it does not require the recognition of certain types of documents in electronic form, regardless of their electronic nature. It is not limited to signatures that are properly connected cryptographically both by the text of the document (see Digest) and by a specific key, whose use should be limited to certain people (. B, for example, the alleged sender).
So there is a gap between what cryptographic technology can offer and what the law adopts is both possible and sensible. With the launch of the Internet and electronic devices such as personal computers and mobile phones, legal instruments or formal legal documents have undergone a gradual change in dematerialization. In this electronic age, document authentication can now be digitally verified with different software. All documents requiring authentication can be processed as digital documents containing all necessary information, such as date and time stamping. To avoid unauthorized manipulation or modification of the original document, encryption is used.