1 / 17

Compliance storyboard: “Classifying & controlling content at the input device”

Compliance storyboard: “Classifying & controlling content at the input device”. Application Areas:. Companies wishing to: Prevent redistribution of valuable information including Intellectual Property (IP), Patent, Financial and Personnel information Achieving ISO 27001 Accreditation

watson
Download Presentation

Compliance storyboard: “Classifying & controlling content at the input device”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Compliance storyboard:“Classifying & controlling content at the input device”

  2. Application Areas: Companies wishing to: • Prevent redistribution of valuable information including Intellectual Property (IP), Patent, Financial and Personnel information • Achieving ISO 27001 Accreditation • Merger & Acquisition activity • Knowledge Management • Records Management & Archiving using the ISO 19005 (PDF/A) archive-compliant standard. • Secure Collaboration Projects • Risk Management related to company information • Enforcing Quality Assurance procedures, such as ISO 9000 and Six Sigma

  3. Target Audience • Head of Compliance • Head of Information Security • Chief Information Officer • Company Secretary/COO • Head of Internal Audit • CEO • CFO

  4. Application Scenario • This storyboard is based around Classifying, at the input device, key business documents. • Based upon the ISO 27001 Information Classification selected, the scanned document will be stamped and the appropriate internal controls will be applied, as per the corporate document classification policy. • An end user is presented with the Classification options that are mapped to their role, and authority, within a company. For example, the CFO may have access to a wider range of classification options than those presented to the Office Clerk. • This has a five-tier classification model.

  5. Authenticating The user is required to authenticate to the network, using Windows or biometric authentication. This action is recorded and logged.

  6. Main Screen The user is presented with the options applicable to their Role and level of authority within the company.

  7. Preview The selected classification “Top Secret” is embedded in the document, and the appropriate business controls enforced.

  8. Destination Intelligent document routing will initiate the selected business process, generating an audit trail.

  9. Apply security You can enforce your corporate security policies at the input device. In this example, the end-user MUST select a policy.

  10. “Top Secret” Classification Classification of “Top Secret” requires encryption and routes a second archive copy to the Records Management System.

  11. Controlled functionality When a document is classified as “Top Secret”, the User cannot print or edit the controlled document..

  12. Destination options Information can also be protected before it’s distributed externally

  13. Destination options eCopy can interface with corporate e-mail systems

  14. Delivery options From the device, an e-mail can be created and sent; a copy can also be sent to the Head of Compliance.

  15. Audit trail • A detailed Audit Trail is recorded and can be integrated with existing management and reporting tools, such as Business Objects, SAS, and Actuate. The Audit Trail can also be stored within the Records Management system, with the archived documents.

  16. eCopy summary • eCopy can help companies achieve audited compliance through enforcing ISO 27001 classification for their key paper based information. • As the information is classified at the point of entry, eCopy minimizes possible failures to follow the business process. • eCopy can generate an ISO 19005 (PDF/A) archive-compliant copy of a document, together with a detailed audit trail, including authentication details, to prove compliance and to guarantee the integrity of the information through its lifecycle. • eCopy enables Intelligent Document Routing, based upon the business process, to protect and control the distribution of business information. • eCopy provides an intuitive user interface that displays the classification options mapped to the end user profile. • For example, “Highly Confidential”, selected by R&D staff, may generate an ISO 19005 archive copy. “Highly Confidential”, selected by Sales staff, may require different intelligent document routing and controls.

More Related