SlideShare a Scribd company logo
1 of 1
Results at a Glance
Geoff Smith Associates
• Security protocols are automatically enforced
transforms business processes
• Automatic, secure, tamper proof audit trail
saves time and ensures compliance
• Improved image quality adhering to legal
admissibility standards
The Challenge:
• The agency provides specialist services for evidential
scanning to support police prosecution and court
evidence. Providing staff the information they need to
do their job, while also adhering to strict IT security
protocols and rigorous audit trails put a strain on the
system. The agency needed a solution that could
automate this process, ensure compliance, and
provide an audit trail.
The Solution:
• Thousands of different types of case documents are
now automatically ingested and prepared for court
submission, meeting strict evidential weight
guidelines. Image quality is paramount
• Every single action performed during the process is
recorded, providing an automated audit trail.
• Access to data is controlled according to the
operators SC cleared status, making sure a single
operator cannot access all the data from a single
document simultaneously.
LEGAL SERVICES

More Related Content

What's hot

Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Five biggest secrets to an it audit webinar slides
Five biggest secrets to an it audit webinar slidesFive biggest secrets to an it audit webinar slides
Five biggest secrets to an it audit webinar slidesMichelle
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech SolutionsJhugueno
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutionsdoughold
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply Skybox Security
 
Automating The Audit Function Presentation
Automating The Audit Function PresentationAutomating The Audit Function Presentation
Automating The Audit Function PresentationVernon Benjamin
 
Tieto Application Operations
Tieto Application OperationsTieto Application Operations
Tieto Application OperationsAdrian Gafrik
 
How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditingLepide USA Inc
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Servicesjoshua paul
 
Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform. Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform. Nawaz Dhandala
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy managementAlgoSec
 
Compliance plus presentation slide share
Compliance plus presentation slide shareCompliance plus presentation slide share
Compliance plus presentation slide shareAndy Brooks
 

What's hot (20)

Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Five biggest secrets to an it audit webinar slides
Five biggest secrets to an it audit webinar slidesFive biggest secrets to an it audit webinar slides
Five biggest secrets to an it audit webinar slides
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
 
Ahmed
AhmedAhmed
Ahmed
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply
 
Accelerate technology
Accelerate technologyAccelerate technology
Accelerate technology
 
Automating The Audit Function Presentation
Automating The Audit Function PresentationAutomating The Audit Function Presentation
Automating The Audit Function Presentation
 
Tieto Application Operations
Tieto Application OperationsTieto Application Operations
Tieto Application Operations
 
How important is IT auditing
How important is IT auditingHow important is IT auditing
How important is IT auditing
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Services
 
TCL Remote Monitoring
TCL Remote MonitoringTCL Remote Monitoring
TCL Remote Monitoring
 
Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform. Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform.
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Net Monitor Presentation
Net Monitor PresentationNet Monitor Presentation
Net Monitor Presentation
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
Compliance plus presentation slide share
Compliance plus presentation slide shareCompliance plus presentation slide share
Compliance plus presentation slide share
 

Similar to gsa

DECIDE4ACTION Presentation
DECIDE4ACTION PresentationDECIDE4ACTION Presentation
DECIDE4ACTION PresentationRichard Bergeron
 
Lima - Digital Forensic Case Management System
Lima - Digital Forensic Case Management SystemLima - Digital Forensic Case Management System
Lima - Digital Forensic Case Management SystemIntaForensics
 
Neo jurix capabilities
Neo jurix capabilitiesNeo jurix capabilities
Neo jurix capabilitiesNehaa Satalkar
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response serviceSeccuris Inc.
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Redport Capabilities Brief 04182013
Redport Capabilities Brief 04182013Redport Capabilities Brief 04182013
Redport Capabilities Brief 04182013Daniel Van Nostrand
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentationDonnie Eib
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptxdotco
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesTeamBreota
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices Thomas P. Johnson
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 

Similar to gsa (20)

DECIDE4ACTION Presentation
DECIDE4ACTION PresentationDECIDE4ACTION Presentation
DECIDE4ACTION Presentation
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
 
Lima - Digital Forensic Case Management System
Lima - Digital Forensic Case Management SystemLima - Digital Forensic Case Management System
Lima - Digital Forensic Case Management System
 
Neo jurix capabilities
Neo jurix capabilitiesNeo jurix capabilities
Neo jurix capabilities
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Redport Capabilities Brief 04182013
Redport Capabilities Brief 04182013Redport Capabilities Brief 04182013
Redport Capabilities Brief 04182013
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentation
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 

More from Alex Woolfenden

Consumer Loans Infographic - FINAL
Consumer Loans Infographic - FINALConsumer Loans Infographic - FINAL
Consumer Loans Infographic - FINALAlex Woolfenden
 
Global Wealth & Asset Manager
Global Wealth & Asset ManagerGlobal Wealth & Asset Manager
Global Wealth & Asset ManagerAlex Woolfenden
 
Global Credit Card Provider
Global Credit Card ProviderGlobal Credit Card Provider
Global Credit Card ProviderAlex Woolfenden
 
wp-what-you-need-to-know-dpo-sps-and-kofax-en
wp-what-you-need-to-know-dpo-sps-and-kofax-enwp-what-you-need-to-know-dpo-sps-and-kofax-en
wp-what-you-need-to-know-dpo-sps-and-kofax-enAlex Woolfenden
 

More from Alex Woolfenden (6)

nuxeo use cases
nuxeo use casesnuxeo use cases
nuxeo use cases
 
Consumer Loans Infographic - FINAL
Consumer Loans Infographic - FINALConsumer Loans Infographic - FINAL
Consumer Loans Infographic - FINAL
 
offshore bank
offshore bankoffshore bank
offshore bank
 
Global Wealth & Asset Manager
Global Wealth & Asset ManagerGlobal Wealth & Asset Manager
Global Wealth & Asset Manager
 
Global Credit Card Provider
Global Credit Card ProviderGlobal Credit Card Provider
Global Credit Card Provider
 
wp-what-you-need-to-know-dpo-sps-and-kofax-en
wp-what-you-need-to-know-dpo-sps-and-kofax-enwp-what-you-need-to-know-dpo-sps-and-kofax-en
wp-what-you-need-to-know-dpo-sps-and-kofax-en
 

gsa

  • 1. Results at a Glance Geoff Smith Associates • Security protocols are automatically enforced transforms business processes • Automatic, secure, tamper proof audit trail saves time and ensures compliance • Improved image quality adhering to legal admissibility standards The Challenge: • The agency provides specialist services for evidential scanning to support police prosecution and court evidence. Providing staff the information they need to do their job, while also adhering to strict IT security protocols and rigorous audit trails put a strain on the system. The agency needed a solution that could automate this process, ensure compliance, and provide an audit trail. The Solution: • Thousands of different types of case documents are now automatically ingested and prepared for court submission, meeting strict evidential weight guidelines. Image quality is paramount • Every single action performed during the process is recorded, providing an automated audit trail. • Access to data is controlled according to the operators SC cleared status, making sure a single operator cannot access all the data from a single document simultaneously. LEGAL SERVICES

Editor's Notes

  1. Blind – customer may be willing to take calls Industry Legal Location UK Products Kofax® Capture™ Contact Alex Woolfenden (alex.woolfenden@kofax.com) Challenges Geoff Smith Associates provide specialist services for evidential scanning to support police prosecutions and court evidence. This specialist service requires staff with a SC cleared status and a supporting technical platform that adheres to strict IT security protocols and rigorous audit trail. GSA required a scanning platform that offered Enterprise class robustness, security and audit trail. Kofax was selected to provide the platform to carry out this vital service in supporting UK police forces. Solution GSA use Kofax to scan in thousands of different document types which can vary dramatically depending on the case type. From reams of financial data to scraps of paper notes, tickets, receipts or cheques. All the documents must me legible for court submission and carry maximum evidential weight. Every single action performed in the Kofax platform is recorded. Covering the time of the action and the operator. In instances where data is so sensitive that a single operator can not see all of it, the indexing tasks can be split between operators. Benefits The Kofax implementation has supported GSA in it's drive to offer the highest level of secure evidential scanning. The automatic creation of an audit trail of actions saves massive amounts of time in comparison to a manual record. It also provides a much more secure and tamper proof method of audit trail. The quality of images is also paramount to enable maximum evidential weight and allow Legal Counsel to view filtered material. The quality of image allows materials to be entered for trial that may not have been admissible previously. This has potentially critical ramifications for successful prosecutions.