SlideShare a Scribd company logo
1 of 29
18 Ways to Secure Your Electronic Documents
Question
Are your organization’s
document management
security inefficiencies leaving
you open to legal and
economic repercussions?
Compliance
Compliance with mandates such
as the Privacy Act, Freedom of
Information Act, HIPAA and the
Sedona Principals for e-discovery
and disclosure are causing
ongoing concern within
government agencies and
corporations…and increased
need for solid document security.
6 Facts About U.S. Business Documents
Over 30 billion original documents are used each year in the
United States.
The cost of documents to corporations is estimated to be as
much as 15 percent of annual revenue.
85 percent of documents are never retrieved.
50 percent of documents are duplicates.
more >>
6 Facts About U.S. Business Documents
60 percent of documents are obsolete.
For every dollar that an organization spends to create a final
document, 10 dollars are spent to manage the document
creation process.
SOURCE: Microsoft Corporation
Electronic Document Management Systems
Electronic repositories designed to
provide organized, readily retrievable,
collections of information for the life
cycle of the documents.
Challenge
How can you keep these
electronic files secure
during the entire chain
of custody?
From Blue Mountain Data Systems
18 Security Suggestions
For Your Electronic Documents
Suggestion #1
Paper documents may be
secured by locking them in a
file cabinet or safe. Before
they are digitized, however, a
security hierarchy must be
carefully planned, to avoid
inadvertent disclosure.
Suggestion #2
It is important to preserve the
original files in an unalterable
state in order to add
legitimacy to the system.
When scanned, PDF is a
standard storage format.
Searchable PDF is even better.
Suggestion #3
You need to develop a
consistent, scalable security
hierarchy that’s easy to
administer and update as
staff and roles change.
Suggestion #4
This makes your security
management tasks easier to
manage. It’s a waste of time
to manually adjust permission
settings on a multitude of
documents.
Suggestion #5
Enable rights to the EDMS
application through Active
Directory. This enables
assignment of individual and
group rights, as necessary, as
well as making it easier to
change or update security as
your organization and
document security needs
change.
Suggestion #6
While rights to the application may
be established via Active Directory,
establishment of security roles
within the application facilitates a
more granular approach to
controlling who can see various
collections of documents, as well
as who can administer the
application.
Suggestion #7
If your employees access the
document repository via
mobile phones or tablets, you
should disable automatic
login so that the secure
information is not
compromised should a device
be lost or stolen.
Suggestion #8
The majority of security issues with
documents are due to internal
mismanagement or manipulation. The
biggest threat may already be inside your
firewall. It is important to protect
documents from insiders – employees who
may want to steal information such as
customer bank account numbers or
electronic medical records. Innocent
threats include inadvertent deletion of
documents. This may be controlled through
the use of read-only permission assignment
to document storage areas.
Suggestion #9
One of the most dangerous and
easily preventable ways of ensuring
document security is to only allow
employees or contractors access to
sensitive files when they have a
need for such access, and only for as
long as they need access to them.
This prevents inappropriate access
of those documents at a later date
and will prevent your company from
potential litigation.
Suggestion #10
Ensure that there are provisions in
place to prevent non-malicious
events such as accidental deletion
or modification of documents from
occurring by users. Remember
that your employees are your most
valuable assets but they are also
the most likely to make mistakes.
These unintentional mistakes can
hurt your company’s reputation.
Suggestion #11
Be sure each piece of information
you gather is necessary for any of
the current functions or activities
of your organization or agency. If
you don’t need it, don’t collect it in
the first place. Also…don’t collect
personal information just because
you think that you will use that
information at a later date. Don’t
store what you don’t need.
Suggestion #12
Be sure all personal
information has been
removed from electronic
devices before you assign
them to a different user, or
send them to be recycled.
Suggestion #13
Disable electronic
document exports for
employees who do not
have permission to store
sensitive documents
locally.
Suggestion #14
Are your records and
documents protected from
fire, flood, and natural
disasters? Have a backup plan
that saves files in an
alternative location should a
disaster occur.
Suggestion #15
It is just as important to delete files
as well as keep them. Review
records retention guidelines. If you
don’t have a records retention
schedule, create one. Schedule the
destruction of electronic records
you do not need to archive once
they reach the end of their useful
life.
Suggestion #16
Email is a vital tool for all
organizations. Yet it can expose
your agency to significant risks due
to the unintentional disclosure of
confidential information, as well as
data loss or destruction due to
viruses or the unintentional
downloading of other malware
programs. Secure your employee
email accounts and archives, and
control via policy the types of
attachments that may be emailed.
Suggestion #17
When your employees create files using
word processing or other applications,
information about them and the edits
they make are stored as hidden
information within the document file. This
information is called metadata. This
hidden metadata can become visible
accidentally – when a file is improperly
converted, or when a corrupted file is
opened. Reduce or eliminate the
metadata in your documents before you
store them electronically.
Suggestion #18
When you destroy electronic
records from your EDMS, be sure
they are gone for good. Many
people don’t realize that files that
have been deleted can be
recovered using forensic recovery
software. Ensure that hard drives
are “scrubbed” so that the data is
not recoverable.
ABOUT US
Blue Mountain Data Systems Inc.
Blue Mountain Data Systems Inc. is dedicated to application
and systems development, document management and the
automation of workflow processes.
Read more about our experience here:
>> http://bluemt.com/experience
MANAGEMENT
Paul T. Vesely
Founder, President, CEO and Principal Architect
Mr. Vesely is a recognized thought leader in systems
architecture and delivery, having designed and
delivered many enterprise wide information and
document management solutions. Mr. Vesely’s history
includes 33 years experience in the information
systems industry, with Unisys, Grumman, PRC and a
host of clients in both government and private sectors.
CONTACT US
Contact Us Today to Discuss Your Next IT Project
HEADQUARTERS
366 Victory Drive
Herndon, VA 20170
PHONE 703-502-3416
FAX 703-745-9110
EMAIL
paul@bluemt.com
WEB
http://bluemt.com

More Related Content

What's hot

Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud AKHIL969626
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talkritupande
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentationJonica Bowne
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security storiesDataGravity
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Lesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationLesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationDataGravity
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 

What's hot (20)

Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentation
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Lesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationLesson plan: How to improve data management in education
Lesson plan: How to improve data management in education
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 

Similar to How-to: 18 Ways to Secure Your Electronic Documents

CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 

Similar to How-to: 18 Ways to Secure Your Electronic Documents (20)

CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 

More from BMDS3416

Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015BMDS3416
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015BMDS3416
 
Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015BMDS3416
 
10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support ExperienceBMDS3416
 
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your CompetitionBMDS3416
 
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...BMDS3416
 

More from BMDS3416 (6)

Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015Tech Update Summary from Blue Mountain Data Systems September 2015
Tech Update Summary from Blue Mountain Data Systems September 2015
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015
 
Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015Tech Update Summary from Blue Mountain Data Systems May 2015
Tech Update Summary from Blue Mountain Data Systems May 2015
 
10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience10 Things Federal Customers Want from an IT Support Experience
10 Things Federal Customers Want from an IT Support Experience
 
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
16 Ways to Retain Technical Staff - Don't Lose Them to Your Competition
 
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

How-to: 18 Ways to Secure Your Electronic Documents

  • 1. 18 Ways to Secure Your Electronic Documents
  • 2. Question Are your organization’s document management security inefficiencies leaving you open to legal and economic repercussions?
  • 3. Compliance Compliance with mandates such as the Privacy Act, Freedom of Information Act, HIPAA and the Sedona Principals for e-discovery and disclosure are causing ongoing concern within government agencies and corporations…and increased need for solid document security.
  • 4. 6 Facts About U.S. Business Documents Over 30 billion original documents are used each year in the United States. The cost of documents to corporations is estimated to be as much as 15 percent of annual revenue. 85 percent of documents are never retrieved. 50 percent of documents are duplicates. more >>
  • 5. 6 Facts About U.S. Business Documents 60 percent of documents are obsolete. For every dollar that an organization spends to create a final document, 10 dollars are spent to manage the document creation process. SOURCE: Microsoft Corporation
  • 6. Electronic Document Management Systems Electronic repositories designed to provide organized, readily retrievable, collections of information for the life cycle of the documents.
  • 7. Challenge How can you keep these electronic files secure during the entire chain of custody?
  • 8. From Blue Mountain Data Systems 18 Security Suggestions For Your Electronic Documents
  • 9. Suggestion #1 Paper documents may be secured by locking them in a file cabinet or safe. Before they are digitized, however, a security hierarchy must be carefully planned, to avoid inadvertent disclosure.
  • 10. Suggestion #2 It is important to preserve the original files in an unalterable state in order to add legitimacy to the system. When scanned, PDF is a standard storage format. Searchable PDF is even better.
  • 11. Suggestion #3 You need to develop a consistent, scalable security hierarchy that’s easy to administer and update as staff and roles change.
  • 12. Suggestion #4 This makes your security management tasks easier to manage. It’s a waste of time to manually adjust permission settings on a multitude of documents.
  • 13. Suggestion #5 Enable rights to the EDMS application through Active Directory. This enables assignment of individual and group rights, as necessary, as well as making it easier to change or update security as your organization and document security needs change.
  • 14. Suggestion #6 While rights to the application may be established via Active Directory, establishment of security roles within the application facilitates a more granular approach to controlling who can see various collections of documents, as well as who can administer the application.
  • 15. Suggestion #7 If your employees access the document repository via mobile phones or tablets, you should disable automatic login so that the secure information is not compromised should a device be lost or stolen.
  • 16. Suggestion #8 The majority of security issues with documents are due to internal mismanagement or manipulation. The biggest threat may already be inside your firewall. It is important to protect documents from insiders – employees who may want to steal information such as customer bank account numbers or electronic medical records. Innocent threats include inadvertent deletion of documents. This may be controlled through the use of read-only permission assignment to document storage areas.
  • 17. Suggestion #9 One of the most dangerous and easily preventable ways of ensuring document security is to only allow employees or contractors access to sensitive files when they have a need for such access, and only for as long as they need access to them. This prevents inappropriate access of those documents at a later date and will prevent your company from potential litigation.
  • 18. Suggestion #10 Ensure that there are provisions in place to prevent non-malicious events such as accidental deletion or modification of documents from occurring by users. Remember that your employees are your most valuable assets but they are also the most likely to make mistakes. These unintentional mistakes can hurt your company’s reputation.
  • 19. Suggestion #11 Be sure each piece of information you gather is necessary for any of the current functions or activities of your organization or agency. If you don’t need it, don’t collect it in the first place. Also…don’t collect personal information just because you think that you will use that information at a later date. Don’t store what you don’t need.
  • 20. Suggestion #12 Be sure all personal information has been removed from electronic devices before you assign them to a different user, or send them to be recycled.
  • 21. Suggestion #13 Disable electronic document exports for employees who do not have permission to store sensitive documents locally.
  • 22. Suggestion #14 Are your records and documents protected from fire, flood, and natural disasters? Have a backup plan that saves files in an alternative location should a disaster occur.
  • 23. Suggestion #15 It is just as important to delete files as well as keep them. Review records retention guidelines. If you don’t have a records retention schedule, create one. Schedule the destruction of electronic records you do not need to archive once they reach the end of their useful life.
  • 24. Suggestion #16 Email is a vital tool for all organizations. Yet it can expose your agency to significant risks due to the unintentional disclosure of confidential information, as well as data loss or destruction due to viruses or the unintentional downloading of other malware programs. Secure your employee email accounts and archives, and control via policy the types of attachments that may be emailed.
  • 25. Suggestion #17 When your employees create files using word processing or other applications, information about them and the edits they make are stored as hidden information within the document file. This information is called metadata. This hidden metadata can become visible accidentally – when a file is improperly converted, or when a corrupted file is opened. Reduce or eliminate the metadata in your documents before you store them electronically.
  • 26. Suggestion #18 When you destroy electronic records from your EDMS, be sure they are gone for good. Many people don’t realize that files that have been deleted can be recovered using forensic recovery software. Ensure that hard drives are “scrubbed” so that the data is not recoverable.
  • 27. ABOUT US Blue Mountain Data Systems Inc. Blue Mountain Data Systems Inc. is dedicated to application and systems development, document management and the automation of workflow processes. Read more about our experience here: >> http://bluemt.com/experience
  • 28. MANAGEMENT Paul T. Vesely Founder, President, CEO and Principal Architect Mr. Vesely is a recognized thought leader in systems architecture and delivery, having designed and delivered many enterprise wide information and document management solutions. Mr. Vesely’s history includes 33 years experience in the information systems industry, with Unisys, Grumman, PRC and a host of clients in both government and private sectors.
  • 29. CONTACT US Contact Us Today to Discuss Your Next IT Project HEADQUARTERS 366 Victory Drive Herndon, VA 20170 PHONE 703-502-3416 FAX 703-745-9110 EMAIL paul@bluemt.com WEB http://bluemt.com