A-Z Popular Blog Encyclopedia Search »
Information Science
Related Guides

5 Examples of Non-repudiation

 , updated on December 23, 2016
Non-repudiation is the ability to prove or disprove that something happened such as a financial transaction or a binding signature on a legal agreement. It has its roots in legal processes intended to prevent entities from claiming they didn't agree to something or sign a document. In its modern form, it is both a legal and technology concern. The following are illustrative examples of non-repudiation.


It is common for the signing of legal documents to be witnessed by a licensed notary. The notary ensures that the signature is authentic and not made under the undue influence of a third party.

Forensic Science

A handwriting expert may be used by a legal service as a means of non-repudiation of signatures.


A user is authenticated according to multiple factors before performing a financial translation on a banking website. This makes it more difficult for the user to dispute a transaction such as a stock trade.

Audit Trail

A financial website maintains a detailed record of each page visited including information such as IP addresses. This information can be used in digital forensics to prove the authenticity of a user action.

Digital Signatures

A ecommerce retailer accepts invoices from a supplier electronically using an integration interface. The interface authenticates the partner by confirming that they can decrypt a message that was encrypted using the public key found in the partner's digital certificate. This involves sending an encrypted hashcode and requiring the partner to decrypt it and send it back. An audit trail is created that includes the unique hashcode that was decrypted by the partner. The only way that the partner can realistically claim the transaction didn't happen to to claim their private key was compromised.
Overview: Non-repudiation
TypeInformation Assurance
Information Security
DefinitionThe ability to prove or disprove that something happened such as a financial transaction or legally binding signature.
ValueA cornerstone of law, commerce and information security.
Related ConceptsInformation Security
Audit Trail
Information Assurance

Information Science

This is the complete list of articles we have written about information science.
Filter Bubble
Information Analysis
Information Flow
Information Literacy
Information Quality
Information Security
IT Examples
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.

Types of Technology

A reasonably comprehensive list of information technologies.


A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map