Aerotek, Inc. v. Lerone Boyd, Michael Marshall, Jimmy Allen, and Trojuan Cornett

IN THE SUPREME COURT OF TEXAS ════════════ NO. 20-0290 ════════════ AEROTEK, INC., PETITIONER, v. LERONE BOYD, MICHAEL MARSHALL, JIMMY ALLEN, AND TROJUAN CORNETT, RESPONDENTS ══════════════════════════════════════════════════ ON PETITION FOR REVIEW FROM THE COURT OF APPEALS FOR THE FIFTH DISTRICT OF TEXAS ══════════════════════════════════════════════════ Argued February 23, 2021 CHIEF JUSTICE HECHT delivered the opinion of the Court, in which JUSTICE GUZMAN, JUSTICE LEHRMANN, JUSTICE DEVINE, JUSTICE BLACKLOCK, JUSTICE BUSBY, JUSTICE BLAND, and JUSTICE HUDDLE joined. JUSTICE BOYD filed a dissenting opinion. Contracts are increasingly signed electronically, with an online click for every kind of transaction imaginable—from simple, everyday retail purchases to complex matters of great consequence. The utility of digital contracts depends heavily, of course, on their enforceability as a matter of law. The Texas Uniform Electronic Transactions Act (the Act) 1 states that “[a]n electronic record or electronic signature is attributable to a person [by] showing . . . the efficacy of any security procedure applied to determine the person to which the electronic record or electronic 1 TEX. BUS. & COM. CODE ch. 322. signature was attributable.” 2 The issues before us are how the efficacy of a security procedure is shown and, once it is, whether the alleged signatory’s simple denial that he signed the record is sufficient to prevent attribution of an electronic signature to him. We hold here that attribution was conclusively established and therefore reverse the judgment of the divided court of appeals. 3 I A Aerotek hires employees globally by the hundreds of thousands to work as contractors for client companies. To keep hiring efficient, Aerotek worked with a software developer to build an online-only hiring application. Aerotek exclusively uses this computerized hiring application to guide employee candidates through the hiring process—a process sometimes referred to as “onboarding”. Aerotek’s hiring application automatically sends a welcome email to the email address the candidate has provided during the recruitment and initial interview process. The welcome email includes a unique hyperlink for the candidate to use to navigate to the hiring application’s online account-registration page. Once there, the candidate creates a unique user ID and password and selects security questions. To later log in to the hiring application, the candidate must enter this user ID, password, and security-question combination correctly. This login process takes place each time the candidate leaves and returns to the hiring application. The computerized hiring application presents the candidate with employment information and various contracts to sign electronically. The first document requiring an electronic signature is an Electronic Disclosure Agreement (EDA). By signing the EDA, the candidate consents to “be 2 Id. § 322.009(a). 3 __S.W.3d__ (Tex. App.—Dallas Aug. 27, 2019). 2 bound” by Aerotek’s electronic hiring documents “as though . . . signed . . . in writing.” After the candidate signs the EDA, the application presents other documents to the candidate for completion and signature. These documents ask for personal information, such as addresses and emergency contacts. The application requires candidates to complete and electronically sign the documents in a particular order. After the candidate completes the initial documents, the application unlocks four additional documents, including a Mutual Arbitration Agreement (MAA). The candidate may electronically sign these documents in any order, but he must complete all four before the computerized application will allow him to continue and complete the hiring process. As the candidate enters information and signatures on the documents, the hiring application tracks his progress. For nearly every action the candidate takes, the hiring application stores an electronic record in a database. For instance, each time a candidate electronically signs a document the hiring application stores a new electronic record that includes the candidate’s unique identifier, the type of document, and a timestamp showing the date and time the document was signed. Once the application records that information, Aerotek cannot change it. A candidate who claims to lack the ability to use the computerized hiring application is invited to Aerotek’s office for assistance. But the candidate must still go through the hiring application step by step, providing the same information and signatures that would be required if he were not assisted. B Trojuan Cornett, Michael Marshall, and Lerone Boyd each completed Aerotek’s computerized hiring application on his own. Jimmy Allen completed his in Aerotek’s office with assistance from Sybil Harper, an administrative assistant. Their completed applications all include 3 an MAA, timestamped with their signature just a few minutes after they signed the EDA. 4 Aerotek hired all four (the Employees) to work as contractors on a construction project for Aerotek’s client, J.R. Butler, Inc. All four were terminated not long after starting work and sued Aerotek, Butler, and others for racial discrimination and retaliation. 5 Aerotek moved to compel arbitration. It attached to its motion each Employee’s timestamped EDA and MAA, along with database records showing the timestamp for every other action taken by each Employee in completing the hiring application. The Employees opposed the motion. Represented by the same lawyer, each submitted a sworn declaration acknowledging that he had completed the online hiring application but denying that he had ever seen, signed, or been presented with the MAA. In substance, the four declarations are word-for-word identical; Allen’s differs only in its acknowledgment that he was assisted by Harper. 6 4 From start to finish, the record shows that the Employees each took only a few minutes to complete the hiring application. For Cornett, timestamps show that he electronically signed the EDA on “11/15/16 11:29 PM” and the MAA on “11/15/16 11:56 PM”. He submitted his application for review on “11/16/16 12:15 AM”. For Marshall, timestamps show that he electronically signed the EDA on “11/17/16 6:31 PM” and the MAA on “11/17/16 6:42 PM”. He submitted his application for review on “11/17/16 6:43 PM”. For Boyd, timestamps show that he electronically signed the EDA on “11/22/16 10:32 AM” and the MAA on “11/22/16 11:02 AM”. He submitted his application for review on “11/22/16 11:07 AM”. And for Allen, timestamps show that he electronically signed the EDA on “3/14/17 4:22 PM” and the MAA on “3/14/17 4:31 PM”. He submitted his application for review on “3/14/17 4:32 PM”. 5 None of the other defendants are parties to this proceeding. 6 The other three Employees swore in their declarations that they were “required to review and agree to certain terms, conditions, policies and/or procedures” as part of the onboarding process. These they “reviewed . . . online and signed . . . electronically.” However, they all denied ever having “seen”, “reviewed,” been “presented with”, or “sign[ed] any document, electronically or otherwise, [agreeing to] arbitrate claims against Aerotek”. Nor were they otherwise “told” about or asked to “consent” to the MAA. In sum, they swore that “no one from Aerotek . . . ever mentioned arbitration to [them] before this lawsuit was filed.” Allen swore similarly to the other Employees in his declaration. He, too, admitted that he “reviewed and agreed to” Aerotek’s “terms, conditions, policies and/or procedures” online as part of his onboarding process. He, too, denied ever having “seen”, “reviewed”, “sign[ed]”, been “told” about or “presented with”, or otherwise “consented[] to” any arbitration agreement. Unlike the other Employees, though, Allen swore that he “was not computer savvy”, and so he “sat with” an Aerotek administrative assistant, Sybil Harper, who “went through and signed all [his] paperwork electronically”. 4 The trial court conducted an evidentiary hearing on Aerotek’s motion to compel. Phaedra Marsh, a program manager who had worked for Aerotek for nearly 20 years, testified that while Aerotek personnel did not write the computer code themselves, she helped design and develop the application by defining how it would operate—specifications sometimes referred to as “business rules”. 7 The software developer then reduced those business rules to computer-readable code. Marsh testified that although she was neither part of Aerotek’s IT department nor an IT expert, she did all the hiring application’s testing, managed its updates and enhancements, and directed the training that Aerotek provided internally. Marsh also performed an in-court demonstration on a laptop and external monitor to show how each step in the hiring-application process worked. Asked whether there was any possible way the Employees could have completed their applications without executing the MAA, Marsh answered: “Not with this process. It’s locked throughout . . . , so they have to complete everything in that section before they can get to the finalize-and-submit section. So everything has to be signed and completed before they get there.” Further, she added, “[w]e don’t have the ability to alter [forms] after they’re submitted” by a candidate. Marsh testified that the hiring-application process had not changed since the Employees used it. The only glitch she described in the use of the hiring application was when one of the four servers housing the data for the system went down, with the result that a candidate could not 7 See Kenneth A. Bamberger, Technologies of Compliance: Risk and Regulation in a Digital Age, 88 TEXAS L. REV. 669, 707 (2010); see also Peter DiCola & David Touve, Licensing in the Shadow of Copyright, 17 STAN. TECH. L. REV. 397, 443 n.189 (2014) (“In software development, business logics are the parts of the underlying computer code that reflect rules about what data will be displayed and what data the user can enter.”); David Kiefer & Marc Lauritsen, Recent Developments in Automating Legal Documents, 52 SYRACUSE L. REV. 1091, 1093 (2002) (describing how “complex business logic rules” are used by law firms to automate their workflow); Harry Surden, Artificial Intelligence and Law: An Overview, 35 GA. ST. U. L. REV. 1305, 1317 (2019) (describing how legal experts and computer programmers work together to define a computer application’s “formal rules” that enable it to complete a legal task, like filing taxes). 5 immediately respond to the welcome email’s invitation to use the application. Aerotek’s only other witness was the administrative assistant that assisted Allen, Sybil Harper. She testified that while she assisted Allen in completing his application as shown by the computer record, she did not recall the event specifically. Harper testified that she uses a “very strict” and “very structured” process for assisting candidates with the hiring application. Over “a hundred times” she has sat “next to” candidates in “a designated computer lab” to personally assist them with completing the hiring application. She starts out by helping the candidate to retrieve Aerotek’s welcome email from the candidate’s personal email. Then she assists candidates, as needed, with using the welcome email to navigate to the hiring application and create their user name and password. From there, Harper assists the candidate with “start[ing] the on-boarding process.” Harper ensures that “[e]verything is entered” and “signed electronically”, including the “electronic disclosure”, “biographical information”, and other documents, such as the “arbitration agreement”. Harper also testified that at “each step as [they] go through with the process” she gets renewed “consent” to continue. She also stated that she cannot “bypass” the hiring application’s business rules and has never “electronically attached someone’s signature to any document”— including an arbitration agreement—without the person’s consent. “[E]verything has to be done in order,” Harper explained, and “[b]y the end of it” she assists the candidate with finishing the application through “the finalize and submit process.” The Employees offered only their declarations as evidence, the parties having agreed that the court could consider the declarations as sworn testimony in open court. The trial court denied Aerotek’s motion to compel arbitration. A divided panel of the court of appeals affirmed. The majority rejected Aerotek’s argument that it had conclusively established 6 the MAAs’ validity. The majority concluded that Marsh had “insufficient capacity to establish the system was failsafe” since she was “not an IT expert”. 8 Her in-court demonstration of the hiring application, the majority said, showed merely “what happened in the system that day in court”, not necessarily what the Employees had actually experienced. 9 The majority reasoned that “Marsh never vouched for the [database] records’ integrity, nor could she adequately explain the security measures Aerotek took.” 10 The majority noted that Aerotek “did not bring a witness from” the software developer that created the hiring application “to provide technical explanation and vouch for the system security.” 11 In any event, the majority concluded, Marsh was an interested witness whose testimony the trial court was free to discount, especially if there were demeanor and credibility issues not apparent on the face of the record. 12 The Act did not influence its analysis, the majority reasoned, because it does not provide a “framework of appellate review”. 13 The majority also concluded that Harper’s “total lack of specific memory as to her dealings with” Allen failed to conclusively establish that he had signed the MAA. 14 The dissent took issue with the majority’s analysis, arguing that it set “a standard that would make electronic contract formation practically impossible and write section 322.009 out of the 8 __S.W.3d at __. 9 Id. at __ n.4. 10 Id. at __. 11 Id. 12 Id. 13 Id. at __. 14 Id. at __. 7 law.” 15 The court denied Aerotek’s motion for rehearing en banc over a dissent joined by four Justices. 16 We granted Aerotek’s petition for review. II To compel arbitration, a party must prove that a valid arbitration agreement exists. 17 For the MAAs to be valid, the Employees must have consented to them. 18 The Employees argue only that they did not consent to the MAAs because the electronic signatures on the agreements are not theirs. They admit that they completed Aerotek’s online hiring application but deny that they were presented with the MAAs during that process. The trial court believed them. We must defer to the trial court’s factual finding that the Employees did not sign the MAAs if that finding is “supported by evidence”. 19 Aerotek contends that it conclusively established that the Employees signed the MAAs by proving that the security procedures for its hiring application would have made it impossible for the Employees to complete their applications without signing the MAAs during that process. “Evidence is conclusive only if reasonable people could not differ in their conclusions, a matter that depends on the facts of each case.” 20 For a paper document with a handwritten, wet-ink signature, the genuineness of the 15 Id. at __ (Bridges, J., dissenting). 16 598 S.W.3d 373 (Tex. App.—Dallas 2020) (Schenck, J., dissenting from the denial of reh’g en banc). 17 Henry v. Cash Biz, LP, 551 S.W.3d 111, 115 (Tex. 2018) (citation omitted). 18 USAA Tex. Lloyds Co. v. Menchaca, 545 S.W.3d 479, 501 n.21 (Tex. 2018) (citations omitted). 19 Henry, 551 S.W.3d at 115 (“We review a trial court’s order denying a motion to compel arbitration for abuse of discretion. We defer to the trial court’s factual determinations if they are supported by evidence but review its legal determinations de novo.” (citing In re Labatt Food Serv., L.P., 279 S.W.3d 640, 642–643 (Tex. 2009) (orig. proceeding))). 20 City of Keller v. Wilson, 168 S.W.3d 802, 816 (Tex. 2005) (citation omitted). 8 signature can be proved by direct evidence—for example, testimony by an eyewitness, a witness familiar with the signatory’s handwriting, or an expert who has compared the signature against a genuine specimen. 21 But these authentication methods may not be applicable to a purely electronic signature. 22 While handwritten signatures are unique to an individual, electronic signatures sometimes involve nothing more than clicking a box online and recording the information in an electronic database. 23 Once parties to a transaction have “agreed to conduct [it] by electronic means”, 24 the Act provides a standard for attributing electronic signatures to them. Section 322.009(a) provides that an “electronic signature is attributable to a person if it was the act of the person.” 25 That “may be shown in any manner, including a showing of the efficacy of any security procedure applied to determine the person to which the electronic record or electronic signature was attributable.” 26 Section 322.002(13) defines a security procedure as any “procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record”, including “the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other 21 See TEX. R. EVID. 901. 22 We express no opinion on how to authenticate a handwritten signature created electronically with a stylus, finger, or mouse. Cf. Mayton v. Tempoe, LLC, No. SA-17-CV-179-XR, 2017 WL 2484849, at *4 (W.D. Tex. June 7, 2017) (concluding that the defendants had carried their burden of demonstrating that plaintiff had agreed to arbitration by signing his name on an electronic pen pad). 23 See Realogy Holdings Corp. v. Jongebloed, 957 F.3d 523, 527 & n.1, 528, 532 (5th Cir. 2020) (upholding the district court’s finding that a former employee had agreed to various post-employment, noncompetition provisions in a so-called “clickwrap” agreement). 24 TEX. BUS. & COM. CODE § 322.005(b). 25 Id. § 322.009(a). 26 Id. 9 acknowledgment procedures.” 27 Thus, security procedures may include requiring personal identifying information—such as a social security number or an address—to register for an account; 28 assigning a unique identifier to a user and then tying that identifier to the user’s actions; 29 maintaining a single, secure system for tracking user activities that prevents unauthorized access to electronic records; 30 business rules that require users to complete all steps in a program before moving on or completing it; 31 and timestamps showing when users completed certain actions. 32 These examples are illustrative and not exclusive under Section 322.009(a). The efficacy of the security procedure provides the link between the electronic record stored on a computer or in a database and the person to whom the record is attributed. A record that cannot be created or changed without unique, secret credentials can be attributed to the one person who holds 27 Id. § 322.002(13). Relatedly, the Legislature defined an electronic record as any “record created, generated, sent, communicated, received, or stored by electronic means.” Id. § 322.002(7). A “record” is merely “information that is inscribed on a tangible medium or that is stored in an electronic or other medium and is retrievable in perceivable form.” Id. § 322.002(12). 28 See Butler v. Z&H Foods, Inc., No. 4:19-CV-02759, 2021 WL 630942, at *3 (S.D. Tex. Jan. 29, 2021) (concluding that the plaintiffs’ affidavits denying that they electronically signed an arbitration agreement did not raise a fact issue where the defendant introduced their employment files with “completed electronic employment applications containing personal details”, “digitally signed [Arbitration] Agreements”, and forms “contain[ing] social security numbers, digitally signed on the same day as the Agreements”); Thick v. Dolgencorp of Tex., Inc., No. 4:16- CV-00733, 2017 WL 108297, at *2 (E.D. Tex. Jan. 11, 2017) (same). 29 See Rosales v. Coca-Cola Sw. Beverages LLC, No. EP-18-CV-361-PRM, 2019 WL 1493359, at *7 (W.D. Tex. Apr. 3, 2019) (concluding that the defendant had met the requirements of § 322.009(a) by demonstrating that “employees enter unique employee identification numbers when they access electronic modules during the onboarding process”). 30 See Fries Rest. Mgmt., LLC v. Silva, No. 13-18-00596-CV, 2020 WL 4381994, at *3 (Tex. App.—Corpus Christi July 30, 2020, pet. filed) (concluding that the evidence conclusively demonstrated the existence of a valid arbitration agreement where the defendant presented uncontroverted testimony that it exclusively used a specific online system for hiring employees and that it would have been impossible for the plaintiff to be added to payroll without the plaintiff’s having electronically signed the arbitration agreement). 31 See id. 32 See GC Servs. L.P. v. Little, No. H-19-1180, 2019 WL 5425032, at *6 (S.D. Tex. Oct. 23, 2019) (finding that the plaintiff had electronically signed the Dispute Resolution Agreement where her “timeline conflict[ed] with the timestamped documents and the credible evidence showing GC Services’[] usual application procedures”). 10 those credentials. The Employees do not disagree. They concede that they completed Aerotek’s computerized hiring application and electronically signed the documents included—save for one, the MAA. Aside from their denials, they offered no evidence to support their allegation that they did not electronically sign the MAAs that Aerotek introduced into evidence. Instead, they simply argue that Aerotek’s evidence fell short of establishing the efficacy of the hiring application’s security procedures. According to the Employees, the trial court was free to disregard Aerotek’s witnesses. Aerotek’s evidence showing the security procedures its hiring application used to verify that a candidate electronically signed his MAA was uncontroverted. To enter the application, a candidate was required to create for himself a unique identifier, a user ID, a password, and security questions, all unknown to Aerotek. The candidate was required to enter personal information and sign documents by clicking on them. The application recorded and timestamped the candidate’s every action. The application’s business rules made it so that the application could not be submitted until all steps were completed and all required signatures provided, including on the MAA. Once a candidate submitted his application, Aerotek could not modify its contents. Aerotek provided the signed MAAs marked with timestamps identical to those in its database records showing each Employee’s progress through the application. The Employees argue that Marsh did not testify that it was impossible to complete the hiring application without signing the MAA, but that was exactly her testimony. Asked whether there was “any possible way” she could “imagine” that happening, she answered, “[n]ot with this process.” Marsh explained that every part of the application had to be “signed and completed” 11 before the application could be “finalize[d] and submit[ted]”—statements backed up by her in- court demonstration of the very hiring application that the Employees used. The Employees argue that their signatures could have been added after their applications were completed. Again, Marsh testified to the contrary: “[w]e don’t have the ability to alter [forms] after they’re submitted” by a candidate. The Employees argue that Marsh’s in-court demonstration of the application showed only how it had worked that day, not how it worked when they used it. But Marsh specifically testified that the hiring application process had not changed since the Employees used it. The Employees argue that the application they used may have had a glitch. But Marsh testified that the only time a glitch occurred was when a server went offline and a candidate could not immediately respond to his invitation to use the system. The Employees argue that no evidence supports a finding that they signed the MAAs because Marsh did not “observe” them doing so. But Marsh did not need to observe them because the hiring application did, invisibly storing in a database an electronic record of each action the Employees took. The Employees argue that testimony from a computer programmer, or at least an IT expert, was required to prove the application’s operation and security procedures. But Marsh testified that she had helped develop the application and managed its use in hundreds of thousands of instances. She was sufficiently familiar with the hiring application to give testimony on its actual operation. The Employees argue that Marsh was an interested witness whose testimony the trial court was free to discount. “Testimony by an interested witness may establish a fact as a matter of law only if the testimony could be readily contradicted if untrue, and is clear, direct and positive, and there are no circumstances tending to discredit or impeach it.” 33 Marsh’s testimony was certainly “clear, 33 Lofton v. Tex. Brine Corp., 777 S.W.2d 384, 386 (Tex. 1989) (citation omitted). 12 direct, and positive”. The Employees argue that their four affidavits averring that they never saw nor signed the MAA have a collective weight that discredits Aerotek’s evidence. But Marsh explicitly testified that the hiring application’s business rules would have prevented them from completing the hiring process without their signing the MAAs. Moreover, the Employees could have requested forensic tests of the hiring application to show that it did not operate as Marsh described, but they did not. In addition, Allen argues that Sybil Harper, the Aerotek employee who assisted him with his hiring application, must have signed his MAA without his consent. But Harper testified that she routinely uses a “very strict” and “very structured” process for assisting candidates with the hiring application, having helped candidates over “a hundred times” as she sat “next to” them. From retrieving Aerotek’s welcome email, to “creat[ing] a user name and password”, to inputting “biographical information”, to signing the “arbitration agreement”, Harper testified that she makes sure that “[e]verything is entered” and “signed electronically”. And at “each step as [they] go through the process” Harper gets renewed “consent” to continue. Allen does not argue that Harper acted any differently in assisting him. For the same reason, his argument that Harper’s testimony lacks probative value since she does not specifically remember assisting him falls short. More importantly, he asserts with the other three Employees that he intended to complete the hiring application, which could not have been done without his signing the MAA. The Employees also contend that Aerotek’s evidence cannot be conclusive for other reasons. The Employees argue that their “printed name[s]” on the MAAs cannot qualify as “a signature of any kind—not an actual signature or even an electronic signature.” But both our 13 caselaw, for wet-ink signatures, 34 and Section 322.002(8), for electronic signatures, 35 plainly provide otherwise. The Employees argue that Aerotek cannot conclusively prove they electronically signed the MAAs because “people onboarding with Aerotek can, from anywhere, create their ID and password, and can also login from anywhere.” In addition to proving too much, 36 that argument does not account for Aerotek’s evidence, which conclusively established that the only way a person could access each Employee’s information was through a secret combination of unique user ID, password, and security questions known only to the Employee. The Employees complain that Aerotek’s prevailing here would establish “an irrebuttable presumption” that electronic signatures on corporate records are valid. That is simply untrue. The Employees were free to seek discovery to discredit Aerotek’s evidence. They chose not to. Rather than attacking the reliability of the hiring application’s security procedures with evidence of their own, they chose to rely on mere argument. Because arguments are not evidence, 37 no evidence supports the Employees’ contentions. Finally, we cannot agree with the dissent’s suggestion that merely denying an electronic 34 It has long been the law in this State that “any mark” can qualify as a person’s signature, including a simple cross mark. Cf. Howard v. Colquhoun, 28 Tex. 134, 138 (1866); see also Bustillos v. State, 213 S.W.2d 837, 841 (Tex. Crim. App. 1948) (“To sign, in the primary sense of the word, is to make any mark. To sign an instrument or document is to make any mark upon it in token of knowledge, approval, acceptance, or obligation.” (quoting In re Walker’s Estate, 42 P. 815, 816 (Cal. 1895))) (cleaned up). 35 The Legislature defined electronic signature as any “electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.” TEX. BUS. & COM. CODE § 322.002(8). 36 If, as the Employees contend, electronic signatures are invalid merely because a computer application is accessible “from anywhere”, then nearly every electronic signature made today would lack validity, including the typed signature by the Employees’ counsel on their electronically filed briefs in this Court. 37 See Kindred v. Con/Chem, Inc., 650 S.W.2d 61, 63 (Tex. 1983) (“When the evidence offered to prove a vital fact is so weak as to do no more than create a mere surmise or suspicion of its existence, the evidence is no more than a scintilla and, in legal effect, is no evidence.” (citations omitted)); see also Cary v. State, 507 S.W.3d 761, 766 (Tex. Crim. App. 2016) (noting that “arguments are not evidence” in a legal-sufficiency analysis (citation omitted)). 14 signature qualifies as some evidence in showing an electronically signed arbitration agreement’s invalidity. The dissent makes much of the Commission of Appeals’ decision in Ward v. Weaver, 38 a 90-year-old case in which we approved the Commission’s recommendation that judgment on a verdict failing to find that Mrs. Weaver signed a deed be affirmed. 39 Whatever Ward’s continued validity is today, it does not control here. For starters, the case is not binding on this Court. As we have explained many times, “our approval of the judgment recommended by the Commission . . . is not to be construed as an approval by the Supreme Court of the opinion of the Commission in the particular case, or the reasons given in the Commission’s opinion for its conclusion.” 40 And even if the case were binding, it dealt with circumstances materially different from those now before us. By allegedly signing a deed in ink, Mrs. Weaver did not opt into a statutory framework such as the one that the Act provides for electronic signatures, as Aerotek and the Employees did. Under Section 322.009’s framework for electronic-signature attribution, once Aerotek proved its security procedures, the burden shifted to the Employees to demonstrate how their electronic signatures could have wound up on the MAAs without their having placed them there themselves. Mere denials do not suffice. As the dissent agrees, evidence cannot be disregarded when it “demonstrates ‘physical facts that cannot be denied,’ so that ‘reasonable people could not differ in their conclusions.’” 41 Aerotek’s 38 34 S.W.2d 1093 (Tex. Comm’n App. 1931, judgm’t affirmed). 39 Id. at 1094–1095; see also post at 1–2 (“But Mrs. Weaver swore under oath that neither she nor anyone authorized to act on her behalf had ever signed the deed. . . . [T]he Commission of Appeals agreed that Mrs. Weaver’s sworn denial created a fact issue . . . . This Court agreed as well.” (citations omitted)). 40 McKenzie v. Withers, 109 Tex. 255, 256 (1918); see also Provident Life & Accident Ins. Co. v. Knott, 128 S.W.3d 211, 217 n.7 (Tex. 2003) (“[T]his Court’s approval of the Texas Commission of Appeals’ decision in Johnson did not indicate our agreement with its reasoning.” (citations omitted)). 41 Post at 6 (quoting City of Keller v. Wilson, 168 S.W.3d 802, 815–816 (Tex. 2005)). 15 evidence did exactly that. In sum, Aerotek’s evidence of the security procedures for its hiring application and its operation is such that reasonable people could not differ in concluding that the Employees could not have completed their hiring applications without signing the MAAs. The Employees’ simple denials are no evidence otherwise. III We agree with the dissenting Justices in the court of appeals that the significance of this case extends far beyond the parties’ dispute. 42 As Texans continue to move online, the pace of innovation and change in everyday life continues to accelerate. When it comes to social interaction, some commentators suggest that as many as 72% of all Americans use social media to interact online. 43 Although “applying old doctrines” to these interactions “is rarely straightforward”, 44 it would be even less so if the electronic contracts governing them—terms of use or service, in many cases—were unnecessarily invalidated. When it comes to access to justice, the courts today are likewise heavily dependent on electronic signatures. For instance, our power to hear this case turns on the validity of the electronic, typed signatures that counsel submitted in their briefs. 45 And the same is true for commerce. The United States Census Bureau estimates that as many as 14% of all retail sales in 2020 happened online—up 32.4% from 2019—and all of them involved a contractual 42 598 S.W.3d 373, 374 (Tex. App.—Dallas 2020) (Schenck, J., dissenting from the denial of reh’g en banc). 43 Social Media Fact Sheet, PEW RES. CTR. (Apr. 7, 2021), https://www.pewresearch.org/internet/fact- sheet/social-media/. 44 Biden v. Knight First Amend. Inst. at Columbia Univ., 593 U.S. __, 141 S. Ct. 1220, 1221 (2021) (Thomas, J., concurring). 45 See TEX. R. APP. P. 9.1(c) (“A document that is electronically served, filed, or issued by a court or clerk is considered signed if the document includes . . . a ‘/s/’ and name typed in the space where the signature would otherwise appear . . . .”). 16 exchange of some sort. 46 Our policymaking branch of government, the Legislature, has expressly declared it to be the policy of this State to facilitate those transactions. 47 Courts cannot unnecessarily stand in the way of the Legislature’s attempts to keep pace with that innovation. Moreover, the Legislature is not the only policymaking body trying to keep pace: so, too, is Congress. In 2000, Congress enacted the Electronic Signatures in Global and National Commerce Act (the ESIGN Act). 48 Section 7001 expressly provides that “with respect to any transaction in or affecting interstate or foreign commerce . . . a contract relating to such transaction may not be denied legal effect, validity, or enforceability because an electronic signature or electronic record was used in its formation.” 49 States may “modify, limit, or supersede” Section 7001 “only if” their changes are either consistent with the Uniform Electronic Transactions Act or the ESIGN Act itself. 50 Because online interactions increasingly affect “interstate” and “foreign commerce”, courts must be wary of construing the Act in a way that raises preemption’s 46 Quarterly Retail E-Commerce Sales, U.S. CENSUS BUREAU (Feb. 19, 2021, 10:00 AM), https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf. 47 For instance, the Legislature expressly provided in Section 322.006 that: [The Act] must be construed and applied: (1) to facilitate electronic transactions consistent with other applicable law; (2) to be consistent with reasonable practices concerning electronic transactions and with the continued expansion of those practices; and (3) to effectuate its general purpose to make uniform law with respect to the subject of this chapter among states enacting it. TEX. BUS. & COM. CODE § 322.006; see also id. § 322.007(b) (“A contract may not be denied legal effect or enforceability solely because an electronic record was used in its formation.”). 48 Pub. L. No. 106-229, 114 Stat. 464 (2000) (codified at 15 U.S.C. ch. 96). 49 15 U.S.C. § 7001(a)(2). 50 Id. § 7002(a)(1)–(2). 17 specter. It may be that the use of electronic contracts already exceeds the use of paper contracts or that it will soon. The Act does not limit the ways in which electronic contracts may be proved valid, but it specifically states that proof of the efficacy of the security procedures used in generating a contract can prove that an electronic signature is attributable to an alleged signatory. 51 An opposing party may, of course, offer evidence that security procedures lack integrity or effectiveness and therefore cannot reliably be used to connect a computer record to a particular person. But that attribution cannot be cast into doubt merely by denying the result that reliable procedures generate. * * * * * Aerotek conclusively established that the Employees signed, and therefore consented to, the MAAs, and the trial court erred in denying Aerotek’s motion to compel arbitration. The judgment of the court of appeals is reversed, and the case is remanded to the trial court for further proceedings. Nathan L. Hecht Chief Justice OPINION DELIVERED: May 28, 2021 51 See TEX. BUS. & COM. CODE § 322.009(a). 18