SlideShare a Scribd company logo
1 of 7
Document
Management System
Pharmaceutical
Industry
AUTOMATED WORKFLOWS AND
USER ROLE-BASED
PERMISSIONS.
Security is one of the
most important
parameters in the today’s
world especially
Pharmaceutical
companies who deal
with highly confidential
data.
Business Case
The Client needed a reliable Document
Management System which would
safeguard all its documents with the
highest security and should be cost
effective.
Every document should be approved
with a Digital signature by the
concerned authorities defined for the
document to move ahead in the
hierarchy and it should be tracked as
well.
To safeguard the documents’
confidentiality, Client requested Admin
control over role-based user
permissions for the users and
restricting some to perform certain
actions like print and download.
Create organized folder structures for
the various department to access and
retrieve documents easily.
Challenges
Even though SharePoint is web based collaborative environment, the client requested the
System to be restrictive as the data needed to be very highly secured.
that maintaining security of the application while integrating external app with SharePoint
DocuSign app was used for Digital Signature but Information Right Management (IRM) Library
Library was implemented for higher security; however, DocuSign being an external app was
conflicting with IRM and was open to security breach.
Resolution
1. As the system needed to be restrictive, our experts developed an
approach where the data was highly secured.
2. To keep it simple for Admin, we created 3 groups with different
permissions. Through Admin Dashboard, Users could be added or
removed from respective groups.
3. To increase the security IRM was implemented where user had to
sign in again to view highly confidential documents.
4. To analyze usage and track accountability, admin can monitor who
accessed the documents and modifications made if any.
5. To avoid Information Right Management library conflicting with the
flow of DocuSign app, we created a solution where print and
download access of the documents will be assigned to the requested
1% of the top management team. So basically Digital Signature
feature was assigned to all the users whereas print and download
access was given to specified admin users.
Benefits
Cost Effective Customizable Increased Security
Auditing Structured Folder
Thank You https://www.i2econsulting.com/

More Related Content

What's hot

Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Enhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEnhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEMMAIntl
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Managementson09remotely
 
Best Features of Document Management System Software | Digismartek
Best Features of Document Management System Software | Digismartek Best Features of Document Management System Software | Digismartek
Best Features of Document Management System Software | Digismartek Digismartek
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementRyan Gallavin
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
How a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHow a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHexnode
 

What's hot (20)

Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Enhancing EMR Systems Using Cloud
Enhancing EMR Systems Using CloudEnhancing EMR Systems Using Cloud
Enhancing EMR Systems Using Cloud
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
Identity Access Management
Identity Access ManagementIdentity Access Management
Identity Access Management
 
Iraje version 6 presentation
Iraje version 6 presentationIraje version 6 presentation
Iraje version 6 presentation
 
Best Features of Document Management System Software | Digismartek
Best Features of Document Management System Software | Digismartek Best Features of Document Management System Software | Digismartek
Best Features of Document Management System Software | Digismartek
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access Management
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
How a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHow a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industry
 

Similar to Document Management System SharePoint

Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxBIS Safety
 
Document Management Software Brochure
Document Management Software BrochureDocument Management Software Brochure
Document Management Software BrochureOsource
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data3 Characteristics of Well Protected Data
3 Characteristics of Well Protected DataQATestLab
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentParshant Tyagi
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Digital Folders | Cloud Based Folder Management System
Digital Folders | Cloud Based Folder Management SystemDigital Folders | Cloud Based Folder Management System
Digital Folders | Cloud Based Folder Management SystemBIS Safety
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 
Top Four Advantages of Document Management Systems - Maxxvault
Top Four Advantages of Document Management Systems - MaxxvaultTop Four Advantages of Document Management Systems - Maxxvault
Top Four Advantages of Document Management Systems - MaxxvaultMaxxvault
 
Top examples of enterprise content management (ecm) application 1
Top examples of enterprise content management (ecm) application  1Top examples of enterprise content management (ecm) application  1
Top examples of enterprise content management (ecm) application 1Benevolence Technologies
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 

Similar to Document Management System SharePoint (20)

Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
DMS SOLUTION - 1
DMS SOLUTION - 1DMS SOLUTION - 1
DMS SOLUTION - 1
 
Document Management Software Brochure
Document Management Software BrochureDocument Management Software Brochure
Document Management Software Brochure
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Digital Folders | Cloud Based Folder Management System
Digital Folders | Cloud Based Folder Management SystemDigital Folders | Cloud Based Folder Management System
Digital Folders | Cloud Based Folder Management System
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 
Top Four Advantages of Document Management Systems - Maxxvault
Top Four Advantages of Document Management Systems - MaxxvaultTop Four Advantages of Document Management Systems - Maxxvault
Top Four Advantages of Document Management Systems - Maxxvault
 
Top examples of enterprise content management (ecm) application 1
Top examples of enterprise content management (ecm) application  1Top examples of enterprise content management (ecm) application  1
Top examples of enterprise content management (ecm) application 1
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Document Management System SharePoint

  • 2. Security is one of the most important parameters in the today’s world especially Pharmaceutical companies who deal with highly confidential data.
  • 3. Business Case The Client needed a reliable Document Management System which would safeguard all its documents with the highest security and should be cost effective. Every document should be approved with a Digital signature by the concerned authorities defined for the document to move ahead in the hierarchy and it should be tracked as well. To safeguard the documents’ confidentiality, Client requested Admin control over role-based user permissions for the users and restricting some to perform certain actions like print and download. Create organized folder structures for the various department to access and retrieve documents easily.
  • 4. Challenges Even though SharePoint is web based collaborative environment, the client requested the System to be restrictive as the data needed to be very highly secured. that maintaining security of the application while integrating external app with SharePoint DocuSign app was used for Digital Signature but Information Right Management (IRM) Library Library was implemented for higher security; however, DocuSign being an external app was conflicting with IRM and was open to security breach.
  • 5. Resolution 1. As the system needed to be restrictive, our experts developed an approach where the data was highly secured. 2. To keep it simple for Admin, we created 3 groups with different permissions. Through Admin Dashboard, Users could be added or removed from respective groups. 3. To increase the security IRM was implemented where user had to sign in again to view highly confidential documents. 4. To analyze usage and track accountability, admin can monitor who accessed the documents and modifications made if any. 5. To avoid Information Right Management library conflicting with the flow of DocuSign app, we created a solution where print and download access of the documents will be assigned to the requested 1% of the top management team. So basically Digital Signature feature was assigned to all the users whereas print and download access was given to specified admin users.
  • 6. Benefits Cost Effective Customizable Increased Security Auditing Structured Folder