Resources | Bonafidee

Is PG82 Compliance Enough to Prevent Fraud?

Written by BONAFiDEE | May 9, 2025 3:13:22 PM

The introduction of Practice Guide 82 (PG82) by HM Land Registry marked a pivotal shift in the conveyancing sector’s journey toward digitisation. With clearly defined steps for using electronic signatures in property transactions, PG82 has provided the much-needed regulatory clarity to help firms operate confidently in a digital landscape.

But as with any regulation, ticking the compliance boxes doesn't necessarily guarantee security. Conveyancers need a clear understanding of the requirements of PG82, the vulnerabilities in OTP-based authentication and need to think beyond compliance if they want to avoid the serious legal and reputational risks of digital fraud.

The basic requirements of PG82

PG82 provides a framework for using electronic signatures in deeds lodged with HM Land Registry. To be compliant, conveyancers need to follow a series of steps. 

  1. The document must be signed using an approved digital platform.
  2. Signatories must receive and enter a One-Time Password (OTP) sent to their mobile phone or email.
  3. Signing must occur in the presence of a witness, who also provides their details.
  4. A conveyancer certifies the document, confirming compliance with these steps.
  5. An evidence pack is submitted, documenting the process for HMLR.

On the surface, these steps form a robust process that combines identity confirmation, digital trails and certification. But look closer, and a key weakness emerges; the reliance on OTP authentication as a central form of identity verification.

The vulnerabilities and risks tied to OTPs

One-Time Passwords (OTPs) are widely used in digital transactions. They're quick, easy, and convenient, but not inherently secure. In fact, OTPs have been a known attack vector for fraudsters for years. The harsh truth is that the possession of an OTP does not equal proof of identity. And yet, under PG82, it is currently accepted as a key step in confirming a signatory’s legitimacy, bringing a number of vulnerabilities to the table.

Interception via phishing

A fraudster impersonating a firm may trick a customer into entering their OTP into a fake site, then immediately use it on the legitimate platform.

SIM-wrap attacks

In these scenarios, a criminal takes control of a victim's phone number by convincing the mobile provider to issue a new SIM, giving them full access to OTPs sent by text.

Email compromise

If OTPs are sent via email, a hacked or poorly secured email account can give a fraudster direct access to authentication codes.

Social engineering

In some cases, a fraudster may directly contact a victim, posing as a legal representative, and manipulate them into sharing an OTP under the guise of verifying their identity.

The illusion of security

PG82 compliance creates a structure, but not a guarantee. If fraud is later uncovered, and your only evidence is that an OTP was sent and entered, you may find yourself defending your process in court, rather than being protected by it.

Legal disputes arising from fraudulent transactions are costly, time-consuming and reputation-damaging, even if you’ve followed PG82 to the letter. Because courts don’t just ask whether you complied, they ask whether your actions were reasonable and robust in the circumstances. Simply stating that a signatory “entered the OTP we sent to their mobile” is not enough. 

Thinking beyond compliance - what a secure process looks like

True fraud prevention comes from designing systems that are compliant and resilient to manipulation. For conveyancers and legal professionals, that means embedding deeper verification measures into the signature process through a holistic end-to-end platform. 

  • Biometric verification: Facial recognition, video ID matching, or liveness detection offers a far more secure way to verify a signatory’s identity than OTPs alone.
  • Tamper-proof audit trails: A defensible process includes timestamped, unalterable records of every step, from identity verification to document access, signing and certification.
  • Witness validation: Some platforms go beyond recording the witness’s name and include OTP or biometric verification of the witness themselves, closing another common loophole.
  • End-to-end platform integration: Disparate systems increase the risk of oversight and weak links. A unified platform connects identity verification, signing, witnessing and evidence collection in one secure flow.

Ensure compliance with a holistic platform

PG82 sets the standard, but it doesn’t guarantee protection. OTPs alone are too easy to intercept, manipulate, or misuse, and relying on them as your main defence leaves your firm exposed. Fraud prevention requires more than compliance. It demands robust identity verification, secure audit trails, and end-to-end control over the signing process.

If your only safeguard is an OTP, you’re taking a risk. Compliance might satisfy the checklist, but when challenged, only a defensible, evidence-backed process will truly protect you.

That’s why using a comprehensive end-to-end platform is critical. When identity checks, document signing, witness verification and evidence capture all happen within one secure process, there are no weak links. Just a clear, defensible journey from start to finish.

Download our latest guide to see how your firm can move beyond basic compliance and build a fraud-resistant, fully auditable signing process that stands up to scrutiny.