Chapter 9: Electronic Signatures and 21 CFR Part 11 / Health Canada Requirements

Electronic signatures in a QMS are legally and audit-equivalent to handwritten signatures when they meet four requirements: identity verification (the person signing is uniquely identified), intent (the person knew they were signing), integrity (the signed record cannot be altered without detection), and non-repudiation (the signer cannot deny signing). For US medical device manufacturers under FDA 21 CFR Part 11 and Canadian manufacturers under Health Canada Medical Devices Regulations, additional controls apply: signature manifestation, time-stamping, audit trail, and record protection. Generic e-signature tools (DocuSign, Adobe Sign) are NOT compliant for QMS records — they were designed for contracts, not regulated records. The distinction matters because accredited auditors will fail Stage 2 audits when SOP approvals, training records, or batch releases sit inside a generic e-signature envelope without the controls that regulated industries require. The platform that holds the record must enforce the four pillars natively, not bolt them on through a third-party signing widget. This chapter explains what compliance looks like across ISO 9001, ISO 13485, IATF 16949, AS9100, and the regulators that govern medical device manufacturing in North America.
Frequently Asked Questions
What makes an electronic signature compliant for ISO 9001?
ISO 9001 itself does not prescribe a signature technology. Clause 7.5.3 requires that documented information be controlled — protected from unintended alteration, accessible to authorized users, and retained as evidence of conformity. An electronic signature meets ISO 9001 when it proves three things to an accredited auditor: who signed the record, when they signed it, and that the record has not changed since signing. A name typed at the bottom of a Word document fails all three tests. A signature event captured by a QMS platform — username, timestamp, IP address, document version hash, reason for signing — meets all three. Auditors do not require cryptographic signatures for ISO 9001-only environments, but they do require that the signature be traceable to a unique individual and that the system prevent backdating or substitution. The 250+ organizations that have completed certification through PinnacleQMS use platform-native signatures because the audit trail is generated automatically rather than reconstructed from emails and screenshots when the auditor asks "prove this approval happened on the date claimed."
How is 21 CFR Part 11 different from a generic e-signature?
21 CFR Part 11 is the FDA regulation that governs electronic records and electronic signatures for any organization regulated by the FDA — drug manufacturers, medical device manufacturers, biologics, food. A generic e-signature, governed by ESIGN Act or UETA in the United States, only requires intent and association with the record. Part 11 layers on five additional controls: signature manifestation (the signed document must visibly display the printed name, date, time, and meaning of the signature), audit trail (every action against the record must be captured), record protection (the system must prevent deletion or alteration during the retention period), access controls (only authorized users can sign), and validation (the system itself must be qualified through IQ/OQ/PQ documentation). DocuSign meets ESIGN. DocuSign does not meet Part 11 without significant compensating controls and a validation package most organizations cannot produce. The gap is not a feature gap — it is an architecture gap. Part 11 systems treat the record and the signature as inseparable; generic tools treat them as a contract envelope and a delivery receipt.
What does Health Canada require for medical device document signing?
Health Canada regulates medical devices under the Medical Devices Regulations (SOR/98-282) and aligns with ISO 13485:2016 for quality system requirements. Health Canada does not publish a Part 11 equivalent, but Health Canada inspectors apply the same principles during MDSAP audits: signed records must be attributable, legible, contemporaneous, original, and accurate (the ALCOA principles). Canadian manufacturers exporting to the United States must also satisfy Part 11 through the MDSAP single-audit program, which covers Health Canada, FDA, TGA (Australia), ANVISA (Brazil), and PMDA (Japan) in one audit. The practical outcome: a Canadian medical device manufacturer in Mississauga or Burlington needs the same controls a Boston manufacturer needs, even though the regulatory wording differs. PinnacleQMS configures e-signature workflows to meet the strictest applicable standard, so the same SOP approval workflow that satisfies the FDA also satisfies Health Canada and the other MDSAP jurisdictions without rework.
Can DocuSign or Adobe Sign be used for ISO 9001 QMS records?
For ISO 9001 alone, DocuSign and Adobe Sign can be used for external-facing documents — supplier agreements, customer contracts, NDAs — where the counterparty is not part of the QMS. They should not be used for internal QMS records: SOP approvals, training acknowledgements, CAPA closures, internal audit reports, management review minutes. The reason is custody. Once a document is signed in DocuSign, it lives in DocuSign's cloud and the QMS holds a PDF copy. The auditor asks "where is the master?" and the answer is split across two systems with two different audit trails. When the SOP is revised next year, the old signed version sits in a DocuSign envelope that nobody owns and the new version goes through a different workflow. The integrity link breaks. A purpose-built QMS keeps the record, the signature, the audit trail, and the version history in one custody chain. That single source of truth is what accredited auditors verify against, and it is why /platform was designed with native signatures rather than a DocuSign integration.
What are the four pillars of compliant e-signatures (identity, intent, integrity, non-repudiation)?
Identity means the system can prove the signer is who they claim to be — typically through username and password, two-factor authentication, or biometric. Intent means the signer was given a clear opportunity to review the record and explicitly chose to sign it — not auto-approved, not bulk-signed, not buried in a click-through. Integrity means the record cannot be altered after signing without the alteration being detectable — a hash, a write-protected database row, or a cryptographic seal. Non-repudiation means the signer cannot later claim "that wasn't me" — the audit trail must capture enough context (timestamp, IP, session, reason) that the signature is provably the signer's act. All four pillars must be present simultaneously. A system with strong identity but no integrity (the signed PDF can be edited later) fails. A system with integrity but weak identity (shared accounts, no password policy) fails. PinnacleQMS implements all four through enforced authentication, explicit "I approve this document because..." prompts, immutable database records, and full session logging.
How do auditors verify e-signature compliance on Stage 2?
Accredited auditors test e-signature compliance through three exercises during Stage 2. First, they pick a signed record at random and ask to see the audit trail behind it — who signed, when, from where, with what reason. The system must produce this in under a minute or the auditor flags the record as not demonstrably controlled. Second, they ask to see the user account that signed it and verify the account belongs to a single named person, not a shared role account. Third, they attempt — with the audit team's permission — to alter the signed record and verify the system either prevents the change or logs it visibly. Organizations that pass these three tests have a 98% certification pass rate on first attempt; organizations that cannot produce audit trails in real time typically receive a major nonconformance and have to provide objective evidence within 90 days. The /process page documents how PinnacleQMS clients prepare for these exact tests during the readiness phase.
What about IATF 16949 and AS9100 — do they require e-signature?
IATF 16949 and AS9100 do not require electronic signatures specifically, but both require that approvals be controlled, traceable, and protected from unauthorized change. IATF 16949 clause 7.5.3 (control of documented information) and AS9100 clause 7.5.3 carry the same intent as ISO 9001 with additional sector requirements: IATF requires customer-specific approvals for documents that affect customer products (PPAP, control plans, FMEAs), and AS9100 requires configuration management traceability for any document that affects airworthiness or contractual deliverables. Both standards accept electronic signatures when the four pillars are met. Aerospace primes (Boeing, Lockheed, Bombardier, Pratt & Whitney) increasingly require electronic signatures with audit trails for first-article inspection records and deviation approvals — the trend is toward digital traceability across the supply chain. The /industries/aerospace-defence page covers how AS9100 manufacturers implement signature workflows that satisfy both the standard and customer-specific requirements without duplicating work.
How do you handle signatures from outside the QMS (customer signatures, supplier signatures)?
Need guidance on your certification journey?
Our consultants have prepared more than 250 manufacturers globally — from growing businesses to large enterprises — for successful certification. Get a free, no-obligation consultation tailored to your industry.
External signatures are the boundary case. A customer signing off on an FAI report or a supplier acknowledging a corrective action does not have a QMS account and cannot be issued one. The compliant approach is a guest signature workflow: the QMS generates a one-time signing link, captures the external signer's identity through email verification or government-ID upload, records the signature event in the QMS audit trail, and stores the signed document inside the QMS record — not in a separate envelope. The signature is bound to the record, not to a contract envelope. This avoids the DocuSign custody problem and keeps the audit trail unified. PinnacleQMS supports guest signature workflows for customer FAI sign-off, supplier 8D acknowledgement, contractor safety inductions, and regulator inspection close-out — all captured inside the same audit trail an auditor reviews.
What's the audit-trail expectation for an e-signature event?
The minimum audit trail captured for every signature event must include: signer's full name and unique user ID, timestamp to the second (server time, not client time), IP address and session identifier, the document and version being signed, the meaning of the signature (approve, review, witness, release), the reason for signing if required by SOP, and the cryptographic hash or row-level identifier of the record at the moment of signing. The audit trail must be tamper-evident — appended only, never edited or deleted, retained for the full record retention period (typically the life of the device plus a regulatory tail of two to fifteen years depending on standard). Inspectors will ask to export the audit trail to PDF or CSV and verify it includes every signature event over a representative sample period. Systems that produce partial trails or require IT to "pull from the database" fail the test.
Do automotive PPAP forms accept electronic signatures?
Yes — AIAG PPAP fourth edition explicitly permits electronic signatures on PSW (Part Submission Warrant) and supporting elements when the OEM customer accepts them. Major OEMs (Ford, GM, Stellantis, Toyota, Honda) have all published customer-specific requirements that accept electronic signatures with full audit trails. Tier 1 and Tier 2 suppliers in Ontario, Michigan, and Ohio routinely submit PPAP packages with electronic PSW signatures through customer portals or supplier QMS platforms. The four pillars apply: the engineer signing the PSW must be uniquely identified, the signing event must be timestamped, the warrant document must be locked after signing, and the audit trail must be available on customer request. The /services/iso-9001 and IATF 16949 service pages cover the exact PPAP signature workflows accepted by OEMs.
What happens if the e-signature platform is decommissioned — does the record survive?
This is the question that separates serious QMS platforms from convenience tools. If the platform shuts down or the contract ends, the records and their audit trails must survive in a usable form. Compliant platforms provide three guarantees: full export of all records and audit trails in open formats (PDF/A for documents, CSV or JSON for trails), a written data escrow or extraction clause in the contract, and verifiable record integrity at the point of export (the hash that proved integrity inside the platform must remain verifiable outside it). Generic e-signature tools typically guarantee export of the signed PDF but lose the audit trail context — who signed, when, why — once the envelope leaves the platform. PinnacleQMS contracts include record portability clauses so 250+ certified clients can extract and self-host their full QMS history at any time without losing audit-trail integrity.
How does a purpose-built QMS platform implement compliant e-signatures?
A purpose-built QMS platform like /platform implements e-signatures as a native primitive, not a feature. Every approval, training record, CAPA closure, audit finding, calibration certificate, and batch release uses the same signature engine. Authentication is enforced (mandatory two-factor for regulated workflows). Intent is captured (the user must enter their password again at the point of signing — re-authentication, per Part 11). Integrity is locked (the record version is hashed and the database row is write-protected for the retention period). Non-repudiation is documented (every event is logged with full context). The audit trail is queryable in real time, exportable on demand, and validated as part of the platform's IQ/OQ documentation. The result is that medical device manufacturers, aerospace primes, and automotive Tier 1s all sign records the same way, satisfy their respective regulators, and reduce signature ceremony time from 20 minutes per approval to under 30 seconds.
E-signature compliance checklist
Verify with the QMS vendor or internal IT before signing any production record:
- Every signature event captures user ID, full name, timestamp (server time), IP address, session ID, document version, and signing meaning
- Re-authentication is required at the point of signing (password or two-factor)
- Two-factor authentication is enforced for regulated workflows (Part 11, ISO 13485, MDSAP)
- The signed record cannot be edited, deleted, or backdated after signing
- The audit trail is append-only and cannot be modified by any user including system administrators
- A system administrator's actions against signature data are themselves logged in a separate trail
- The platform produces a complete audit trail report on demand in PDF or CSV
- Each user has a unique account; shared role accounts are not used for signing
- Password policy enforces complexity, expiry, and lockout per regulatory expectation
- Signature manifestation displays the printed name, date, time, and meaning of the signature on the visible record
- Validation documentation (IQ, OQ, PQ) is available from the vendor
- Record retention policy is configurable to match the longest applicable retention requirement
- Records and audit trails can be exported in open formats if the platform contract ends
- Guest signature workflows for external parties (customers, suppliers, regulators) preserve the same audit trail
- The vendor provides a written attestation of Part 11 readiness and a contractual data portability clause
Compliant electronic signatures are not a feature to bolt on — they are an architecture decision made on day one. Organizations that select /platform inherit Part 11-ready, MDSAP-ready, IATF-ready signatures across every QMS module without integrating, validating, or maintaining a third-party signing service. To review how electronic signatures are configured for ISO 13485, MDSAP, AS9100, or IATF 16949 environments, contact PinnacleQMS and request a working session with the implementation team.
Chapter 8: Migrating from Paper or Shared Drive to a Digital QMS Without Losing Audit Trail
Migrating document control from paper or shared drive to a digital QMS platform without breaking the audit trail requires three things: a complete inventory of
Chapter 10: Document Control Audit Checklist: 25 Questions Every Internal Auditor Should Ask
An effective internal audit of document control covers 25 questions across five domains: identification (5 questions), revision control (5 questions), distribut
Request a Consultation
Fill in your details and we'll get back to you.


