FAQ

Do electronic signatures satisfy regulatory approval requirements for non-conformance dispositions?

Electronic signatures can satisfy regulatory approval requirements for non-conformance (NCR) dispositions, but they are not automatically compliant just because they are “electronic.” Whether they are acceptable depends on the applicable regulations, your QMS procedures, and how the system is implemented, controlled, and validated.

Key conditions for electronic signatures to be acceptable

In regulated manufacturing environments (e.g., aerospace, defense, medical, highly regulated industrial), electronic signatures generally need to meet all of the following conditions to be treated as equivalent to handwritten signatures:

  • Identity assurance: The system reliably ties each signature to a unique individual (e.g., unique user ID, strong authentication, controlled account provisioning and deprovisioning).
  • Intent and meaning: At the time of signing, the user is clearly informed what they are approving (e.g., MRB disposition, use-as-is, repair, rework, scrap) and the signature explicitly records that intent.
  • Integrity of the record: Once the NCR and disposition are approved, the record (including signature, time, and content) cannot be altered without a controlled, auditable change process.
  • Audit trail: The system maintains a secure, time-stamped history of who did what, when, and from where, including revisions, re-approvals, and revocations.
  • Access control and segregation of duties: Only authorized roles can sign dispositions (e.g., MRB engineer, quality, customer representative, design authority), and role mappings are controlled under change management.
  • System validation: The electronic system is validated and documented as fit for purpose, with evidence that signatures behave as intended under normal and failure conditions.
  • Procedural alignment: Your QMS documentation (e.g., NCR/MRB procedures, work instructions) explicitly recognizes electronic signatures as valid for the relevant approvals.

Regulators and customers typically care less about the technology label (“electronic”) and more about whether you can prove identity, intent, integrity, and control.

Regulatory and standard-specific considerations

The detailed requirements vary by sector and regulator. A few common patterns:

  • AS9100 / aerospace QMS: AS9100 focuses on documented processes, authority for dispositions, and traceability. Electronic signatures are typically acceptable if your QMS procedures define them, the system is controlled and validated, and you can produce evidence on demand (e.g., during customer or third-party audits).
  • 21 CFR Part 11 (for organizations also under FDA oversight): Part 11 specifies explicit requirements for electronic signatures and records (unique user IDs, authentication, linking of signatures to records, system validation, procedures, and training). If you claim Part 11 alignment, your e-signature implementation must meet those requirements and be documented as such.
  • Customer and airworthiness authority requirements: Some customers, primes, or authorities (e.g., EASA/FAA in certain contexts) may impose additional requirements on who can approve dispositions, how concessions/deviations are handled, and whether electronic approvals are acceptable for specific classes of non-conformance.

In practice, acceptance is driven by documented agreements (specifications, quality clauses, supplier manuals) plus your demonstrated control of the system and process.

How this applies to NCR and MRB dispositions

Non-conformance dispositions (e.g., rework, repair, use-as-is, scrap, deviation/concession) are often high-risk decisions with significant compliance and safety implications. Using electronic signatures for these approvals is typically acceptable only if:

  • Your NCR/MRB procedure explicitly defines which roles must approve which dispositions, and states that electronic signatures in defined systems are equivalent to handwritten ones.
  • The system ensures that the approved disposition is locked to the specific configuration and context of the NCR (part number, serial/lot, routing, revision, defect description).
  • Any change to the disposition or related work instructions triggers re-approval by the appropriate signatories, with a clear audit trail.
  • Where customer or authority sign-off is required (e.g., concessions on flight-critical hardware), their acceptance of your electronic process is documented.

If these conditions are not met, auditors may conclude that signatures do not meet your own QMS requirements or external expectations, even if the technology itself could be capable.

Brownfield and coexistence realities

In most plants, NCRs and MRB decisions span multiple systems:

  • An MES or NCR module may capture the defect and internal approvals.
  • ERP may handle cost and inventory impact.
  • A PLM or QMS may maintain formal dispositions, deviations, or concessions.
  • Customer portals or shared tools may store customer approvals.

Because of this, there is rarely a single source of truth with a single signature. To treat electronic signatures as satisfying regulatory approval requirements across this landscape, you generally need:

  • Clear system of record: An explicit decision about which system is the authoritative record for NCR dispositions and signatures.
  • Controlled interfaces: Integration that prevents silent mismatches between systems (e.g., disposition updated in MES but not in QMS) and preserves the provenance of signatures.
  • Change control: Any configuration change to user roles, routing rules, or e-signature behavior is managed under change control and, where required, re-validation.
  • Fallback and continuity: Defined behavior for outages or manual workarounds (e.g., temporary paper approvals) and how those are reconciled back into electronic records.

Full replacement of legacy NCR/MRB tools purely to standardize signatures often fails in aerospace-grade environments due to validation cost, downtime risk, integration complexity, and the need to maintain long-term traceability to historical records. Layered or federated approaches, with clearly defined systems of record and traceable links, are more common.

Common failure modes to avoid

Electronic signatures for dispositions often fall short of regulatory or customer expectations when:

  • Users share credentials, making identity non-credible.
  • The system auto-logins operators or reuses cached sessions without re-authentication at sign-off.
  • Signatures are “rubber stamps” with no clear statement of what is being approved.
  • Disposition logic changes (e.g., routing rules, approval chains) are made without documented impact assessment or re-validation.
  • Printed copies are treated as primary records, but printed output omits key signature data (e.g., time, approver role, revision).
  • Customer or regulator expectations for physical signatures on specific classes of non-conformance are not captured in procedures and therefore not met.

Each of these weakens the argument that your electronic signatures are equivalent to traditional approvals.

Practical steps to establish acceptability

If you intend electronic signatures to satisfy regulatory approval requirements for NCR dispositions, consider:

  1. Map requirements: Identify applicable regulations, customer requirements, and internal QMS clauses that touch approvals, MRB, and electronic records.
  2. Define in procedures: Update NCR/MRB procedures and work instructions to define where and how electronic signatures are used, which systems are authoritative, and what roles are allowed to approve.
  3. Harden identity and access: Implement strong authentication, unique user IDs, and role-based access control. Prohibit shared accounts.
  4. Validate the system: Document testing that shows signatures are correctly bound to records, survive changes, and produce reliable audit trails.
  5. Engage key stakeholders: Align with quality, engineering, IT, and (where appropriate) key customers or regulatory liaisons before fully retiring wet-ink signatures in sensitive workflows.

Only once these controls are in place and demonstrable does it make sense to rely on electronic signatures as fully satisfying regulatory approval expectations for non-conformance dispositions.

Get Started

Built for Speed, Trusted by Experts

Whether you're managing 1 site or 100, C-981 adapts to your environment and scales with your needs—without the complexity of traditional systems.