SlideShare a Scribd company logo
Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 1 Securing Fax and Document Workflow Geoffrey Anderson Sr. Product Manager Open Text Fax and Document Distribution Group April 16, 2010 Driving Compliance in the Organization
Did you know?
How Compliant Is Your Organization? Are you relying on paper-based document delivery processes? Do you have control over who, how, and where documents are being delivered? Are you confident that information is being received by the right people? Do you have an audit trail for your corporate communications? Is your confidential information kept private?
The Risks of Non-compliance Are Real Stiff fines  Jail time for executives Loss of reputation Loss of brand image Loss of market position
Industries Most Affected by Compliance Financial Services Insurance and Real Estate  Healthcare Legal Government Entities Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 5
Security and Compliance Challenges Automating the document delivery processes Centralizing information delivery and receipt Safeguarding document confidentiality Protecting information against tampering and alteration Tracking, limiting, and monitoring access to information Providing secure storage, historical data, and managing document destruction
Common Regulations
Sarbanes-Oxley Sarbanes-Oxley is the US Government’s response to corporate financial scandals Corporations must monitor, track and manage the creation and reporting of all financial info required for governmental reporting Corporations must establish and maintain an internal control structure and certify its effectiveness Corporations cannot delete records of transactions or related documents as it pertains towards financial performance of the company  Executives that knowingly sign falsified reports and anyone that destroys audit records can receive up to 10 years in prison and fines Destruction, falsification and/or alteration of documents in federal investigations and bankruptcy proceedings can lead to sentences of up to 20 years in prison and fines IT managers must enforce document retention policies
Gramm-Leach-Bliley  Disclosure of “non-public information” by Financial Entities Financial institutionsmust: Respect the privacy of customers and protect the security and confidentiality of customers’ non-public personal information  Protect against any anticipated threats to the security or integrity of customer records, and protect against the unauthorized access to, or use of such records or information Publish and disclose their policies regarding use of client personal info on a regular basis Financial organizations cannot: Disclose non-public information about their customers Use or share the info except to perform a service on behalf of the client, with their permission
HIPAA HIPAA requires health care entities, including hospitals, doctors, nurses, health plans, labs, pharmacies and billing and claims agents, to protect the privacy of a patient’s health information, particularly when communicating electronically.  HIPAA security rule determines how personal health information must be stored and transmitted to: Ensure privacy, security and accuracy Restrict access to personal healthcare information Verify transmission Report, track and provide audit trail
Developing a Compliance Strategy Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 11
Top 5 Compliance Issues Facing Organizations Process control – control who has access, and when and where documents are delivered Information integrity – uncontrolled business documents are potential security threats Privacy – without some form of access control, there is no privacy or security Tracking, reporting, and audit trail – regulations dictate that business protect information, provide a history of what has happened to the information, and which personnel have had access to it Document storage – the problem with storing paper-based documents is the lack of privacy, control, and the difficulties in tracking down information for audit trails Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 12
Solutions for Supporting Compliance Centralized delivery Integration Tamper-resistant Security and management Audit trail Track history Electronic fax repository Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 13
Document Delivery & Archiving:An Integrated Solution Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 14
Open Text Fax and Document Distribution Solutions Low-risk with a high-return on investment  Proven, reliable solutions Over 25 years of fax experience Secure, ensuring confidentiality, and control Tightly integrated with front and back-office applications  Timely, efficient and universally accessible  Easy to install, use and manage  Flexible and scalable systems to match your needs Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 15
Open Text Fax Server, RightFax Edition The market leader in fax server software Integrates and automates the flow of fax, paper, and electronic documents Makes your documents more secure and traceable Provides a complete audit trail for desktop faxing Fax over IP (FoIP) capabilities help organizations extend their VoIP networks to provide secure document delivery Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 16
Open Text Fax Appliance, FaxPress Edition Complete network fax solution in an appliance Includes all the necessary hardware and software  Immediately usable upon installation Allows users to send and receive faxes from the desktop, email, and back-end applications Integrates with most MFP’s as well The perfect solution for small to mid-size businesses or workgroups that need to maintain a high standard of security and efficiency Turnkey solutions require minimal setup and management Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 17
Open Text Document Server, Alchemy Edition A document management software solution used by thousands of small and mid-size businesses worldwide Provides document scanning, document imaging, document archiving, fax archiving and electronic records management capabilities Creates a digital file cabinet for your organization  Securely store any document type and then find it within seconds, even years later Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 18
Open Text Workflow Server, .NET Edition Flexible, integrated, and easy-to-implement workflow solutions Creates a trusted environment where people, processes and documents can come together to improve efficiency, address compliance and increase profitability Brings new levels of productivity to any repeatable business activity from simple workgroup tasks up to enterprise wide processes Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 19
Summary Expanding government regulations put companies at risk Open Text Fax and Document Distribution – integrated solutions that address the whole information lifecycle Solutions to fit any organizational need Trusted solutions leveraged by more than 100,000 Fax Servers in the field Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 20
Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 21 Thank You

More Related Content

What's hot

GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
Eugene Lee
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
Aegify Inc.
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
►David Clarke FBCS CITP
 
GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365
Jaco Liebenberg
 
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen StreckFebruary 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen StreckJohn Wang
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
Olivier BARROT
 
3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid
HRMantra Software Pvt. Ltd
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
privacytalks
 
Convergence Compliance E Discovery Rim.Doc
Convergence Compliance E Discovery Rim.DocConvergence Compliance E Discovery Rim.Doc
Convergence Compliance E Discovery Rim.DocDavid Haines
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
eHealth Forum
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
Tripwire
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
Ben Omoakin Oguntala, developingafrica(dot)net
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow Mapping
VISTA InfoSec
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
AIIM International
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
Owako Rodah
 

What's hot (20)

GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365GDPR non-compliance risks & GDPR365
GDPR non-compliance risks & GDPR365
 
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen StreckFebruary 2009 Working the IT/RIM Relationship Presentation by Helen Streck
February 2009 Working the IT/RIM Relationship Presentation by Helen Streck
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
 
Convergence Compliance E Discovery Rim.Doc
Convergence Compliance E Discovery Rim.DocConvergence Compliance E Discovery Rim.Doc
Convergence Compliance E Discovery Rim.Doc
 
Helen paige
Helen paigeHelen paige
Helen paige
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow Mapping
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
Data protection
Data protectionData protection
Data protection
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 

Viewers also liked

Teoría del idioma indoeuropeo
Teoría del idioma indoeuropeoTeoría del idioma indoeuropeo
Teoría del idioma indoeuropeoNeil Sulca Taipe
 
Artistas renacentistas (2)
Artistas renacentistas (2)Artistas renacentistas (2)
Artistas renacentistas (2)Carolina Bello
 
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS..."PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
Academia de Ingeniería de México
 
New from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiersNew from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiers
Sound Directions Ltd
 
Guia digital edicion 54
Guia digital edicion 54Guia digital edicion 54
Guia digital edicion 54
Guía turistica GUÍATE POR BOGOTÁ
 
Plagio en la_academia_2011
Plagio en la_academia_2011Plagio en la_academia_2011
Plagio en la_academia_2011
Javier Rosas Dominguez
 
Catalogo marimon
Catalogo marimonCatalogo marimon
Catalogo marimon
Jaime Sebastian
 
Fraude en la investigación científica
Fraude en la investigación científicaFraude en la investigación científica
Plan fuerza nacional
Plan fuerza nacionalPlan fuerza nacional
Plan fuerza nacionalPeruDG
 
10. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 201210. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 2012
St.Galler Business School
 
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Miguel Angel Cintas
 
092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1
Facultad de Medicina
 
Buenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantesBuenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantescrusjack
 
Intermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis ProjectIntermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis Project
Melissa Blackman
 
02 Deloitte SFIC 2009
02 Deloitte SFIC 200902 Deloitte SFIC 2009
02 Deloitte SFIC 2009
Pepe
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
kevinwetzel
 
thesis booklet edited for issuu
thesis booklet edited for issuuthesis booklet edited for issuu
thesis booklet edited for issuuCharlotte Choo
 
Redes de negocio colaborativas administración de contratos
Redes de negocio colaborativas administración de contratosRedes de negocio colaborativas administración de contratos
Redes de negocio colaborativas administración de contratos
Nectia Cloud Solutions
 
Competitividad empresarial.
Competitividad empresarial.Competitividad empresarial.
Competitividad empresarial.JennyPaolaR
 

Viewers also liked (20)

Teoría del idioma indoeuropeo
Teoría del idioma indoeuropeoTeoría del idioma indoeuropeo
Teoría del idioma indoeuropeo
 
Artistas renacentistas (2)
Artistas renacentistas (2)Artistas renacentistas (2)
Artistas renacentistas (2)
 
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS..."PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
 
New from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiersNew from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiers
 
Guia digital edicion 54
Guia digital edicion 54Guia digital edicion 54
Guia digital edicion 54
 
Plagio en la_academia_2011
Plagio en la_academia_2011Plagio en la_academia_2011
Plagio en la_academia_2011
 
Catalogo marimon
Catalogo marimonCatalogo marimon
Catalogo marimon
 
La web bdbb 11.1
La web bdbb 11.1La web bdbb 11.1
La web bdbb 11.1
 
Fraude en la investigación científica
Fraude en la investigación científicaFraude en la investigación científica
Fraude en la investigación científica
 
Plan fuerza nacional
Plan fuerza nacionalPlan fuerza nacional
Plan fuerza nacional
 
10. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 201210. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 2012
 
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
 
092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1
 
Buenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantesBuenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantes
 
Intermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis ProjectIntermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis Project
 
02 Deloitte SFIC 2009
02 Deloitte SFIC 200902 Deloitte SFIC 2009
02 Deloitte SFIC 2009
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
thesis booklet edited for issuu
thesis booklet edited for issuuthesis booklet edited for issuu
thesis booklet edited for issuu
 
Redes de negocio colaborativas administración de contratos
Redes de negocio colaborativas administración de contratosRedes de negocio colaborativas administración de contratos
Redes de negocio colaborativas administración de contratos
 
Competitividad empresarial.
Competitividad empresarial.Competitividad empresarial.
Competitividad empresarial.
 

Similar to Securing Fax and Document Workflow: Driving Compliance in the Organization

OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)
Marcel Hoffmann
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
Jon Gatrell
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration Slideshare
OpenText
 
Documentation Best Practices for EAPs
Documentation Best Practices for EAPsDocumentation Best Practices for EAPs
Documentation Best Practices for EAPs
CG Hylton Inc.
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
ARMA International
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
Atle Skjekkeland
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
5 Ways to Boost Regulatory Compliance
5 Ways to Boost Regulatory Compliance5 Ways to Boost Regulatory Compliance
5 Ways to Boost Regulatory Compliance
Flatirons Solutions®
 
ARMS Inc. Information Management presentation
ARMS Inc. Information Management presentationARMS Inc. Information Management presentation
ARMS Inc. Information Management presentation
Yogican
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
Jose Ivan Delgado, Ph.D.
 
Overcome regulatory data retention challenges
Overcome regulatory data retention challengesOvercome regulatory data retention challenges
Overcome regulatory data retention challenges
Bryant Bell
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of Everything
Connected Futures
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Uni Systems S.M.S.A.
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
James Wier
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
Constantine Karbaliotis
 

Similar to Securing Fax and Document Workflow: Driving Compliance in the Organization (20)

OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration Slideshare
 
Documentation Best Practices for EAPs
Documentation Best Practices for EAPsDocumentation Best Practices for EAPs
Documentation Best Practices for EAPs
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
5 Ways to Boost Regulatory Compliance
5 Ways to Boost Regulatory Compliance5 Ways to Boost Regulatory Compliance
5 Ways to Boost Regulatory Compliance
 
ARMS Inc. Information Management presentation
ARMS Inc. Information Management presentationARMS Inc. Information Management presentation
ARMS Inc. Information Management presentation
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
 
Overcome regulatory data retention challenges
Overcome regulatory data retention challengesOvercome regulatory data retention challenges
Overcome regulatory data retention challenges
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of Everything
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 

More from OpenText Information Exchange

OpenText Enterprise World B2B Integration Customer Panel
OpenText Enterprise World B2B Integration Customer PanelOpenText Enterprise World B2B Integration Customer Panel
OpenText Enterprise World B2B Integration Customer Panel
OpenText Information Exchange
 
OpenText - Integrating Fax with Your EMR System
OpenText - Integrating Fax with Your EMR SystemOpenText - Integrating Fax with Your EMR System
OpenText - Integrating Fax with Your EMR System
OpenText Information Exchange
 
OpenText Information Exchange Suite: Accelerating time to transaction
OpenText Information Exchange Suite: Accelerating time to transactionOpenText Information Exchange Suite: Accelerating time to transaction
OpenText Information Exchange Suite: Accelerating time to transaction
OpenText Information Exchange
 
OpenText - Improving the Security of Fax-based Health Information Exchange
OpenText - Improving the Security of Fax-based Health Information ExchangeOpenText - Improving the Security of Fax-based Health Information Exchange
OpenText - Improving the Security of Fax-based Health Information Exchange
OpenText Information Exchange
 
Get Rid of Fax Machines - Increasing the Speed of Health Information Exchange
Get Rid of Fax Machines - Increasing the Speed of Health Information ExchangeGet Rid of Fax Machines - Increasing the Speed of Health Information Exchange
Get Rid of Fax Machines - Increasing the Speed of Health Information Exchange
OpenText Information Exchange
 
Going Green the Right Way: Your Contribution to a Greener Workplace
Going Green the Right Way: Your Contribution to a Greener WorkplaceGoing Green the Right Way: Your Contribution to a Greener Workplace
Going Green the Right Way: Your Contribution to a Greener Workplace
OpenText Information Exchange
 

More from OpenText Information Exchange (8)

OpenText Enterprise World B2B Integration Customer Panel
OpenText Enterprise World B2B Integration Customer PanelOpenText Enterprise World B2B Integration Customer Panel
OpenText Enterprise World B2B Integration Customer Panel
 
9 reasons businesses still fax - infographic
9 reasons businesses still fax - infographic9 reasons businesses still fax - infographic
9 reasons businesses still fax - infographic
 
History of fax - Infographic
History of fax - InfographicHistory of fax - Infographic
History of fax - Infographic
 
OpenText - Integrating Fax with Your EMR System
OpenText - Integrating Fax with Your EMR SystemOpenText - Integrating Fax with Your EMR System
OpenText - Integrating Fax with Your EMR System
 
OpenText Information Exchange Suite: Accelerating time to transaction
OpenText Information Exchange Suite: Accelerating time to transactionOpenText Information Exchange Suite: Accelerating time to transaction
OpenText Information Exchange Suite: Accelerating time to transaction
 
OpenText - Improving the Security of Fax-based Health Information Exchange
OpenText - Improving the Security of Fax-based Health Information ExchangeOpenText - Improving the Security of Fax-based Health Information Exchange
OpenText - Improving the Security of Fax-based Health Information Exchange
 
Get Rid of Fax Machines - Increasing the Speed of Health Information Exchange
Get Rid of Fax Machines - Increasing the Speed of Health Information ExchangeGet Rid of Fax Machines - Increasing the Speed of Health Information Exchange
Get Rid of Fax Machines - Increasing the Speed of Health Information Exchange
 
Going Green the Right Way: Your Contribution to a Greener Workplace
Going Green the Right Way: Your Contribution to a Greener WorkplaceGoing Green the Right Way: Your Contribution to a Greener Workplace
Going Green the Right Way: Your Contribution to a Greener Workplace
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Securing Fax and Document Workflow: Driving Compliance in the Organization

  • 1. Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 1 Securing Fax and Document Workflow Geoffrey Anderson Sr. Product Manager Open Text Fax and Document Distribution Group April 16, 2010 Driving Compliance in the Organization
  • 3. How Compliant Is Your Organization? Are you relying on paper-based document delivery processes? Do you have control over who, how, and where documents are being delivered? Are you confident that information is being received by the right people? Do you have an audit trail for your corporate communications? Is your confidential information kept private?
  • 4. The Risks of Non-compliance Are Real Stiff fines Jail time for executives Loss of reputation Loss of brand image Loss of market position
  • 5. Industries Most Affected by Compliance Financial Services Insurance and Real Estate Healthcare Legal Government Entities Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 5
  • 6. Security and Compliance Challenges Automating the document delivery processes Centralizing information delivery and receipt Safeguarding document confidentiality Protecting information against tampering and alteration Tracking, limiting, and monitoring access to information Providing secure storage, historical data, and managing document destruction
  • 8. Sarbanes-Oxley Sarbanes-Oxley is the US Government’s response to corporate financial scandals Corporations must monitor, track and manage the creation and reporting of all financial info required for governmental reporting Corporations must establish and maintain an internal control structure and certify its effectiveness Corporations cannot delete records of transactions or related documents as it pertains towards financial performance of the company Executives that knowingly sign falsified reports and anyone that destroys audit records can receive up to 10 years in prison and fines Destruction, falsification and/or alteration of documents in federal investigations and bankruptcy proceedings can lead to sentences of up to 20 years in prison and fines IT managers must enforce document retention policies
  • 9. Gramm-Leach-Bliley Disclosure of “non-public information” by Financial Entities Financial institutionsmust: Respect the privacy of customers and protect the security and confidentiality of customers’ non-public personal information Protect against any anticipated threats to the security or integrity of customer records, and protect against the unauthorized access to, or use of such records or information Publish and disclose their policies regarding use of client personal info on a regular basis Financial organizations cannot: Disclose non-public information about their customers Use or share the info except to perform a service on behalf of the client, with their permission
  • 10. HIPAA HIPAA requires health care entities, including hospitals, doctors, nurses, health plans, labs, pharmacies and billing and claims agents, to protect the privacy of a patient’s health information, particularly when communicating electronically. HIPAA security rule determines how personal health information must be stored and transmitted to: Ensure privacy, security and accuracy Restrict access to personal healthcare information Verify transmission Report, track and provide audit trail
  • 11. Developing a Compliance Strategy Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 11
  • 12. Top 5 Compliance Issues Facing Organizations Process control – control who has access, and when and where documents are delivered Information integrity – uncontrolled business documents are potential security threats Privacy – without some form of access control, there is no privacy or security Tracking, reporting, and audit trail – regulations dictate that business protect information, provide a history of what has happened to the information, and which personnel have had access to it Document storage – the problem with storing paper-based documents is the lack of privacy, control, and the difficulties in tracking down information for audit trails Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 12
  • 13. Solutions for Supporting Compliance Centralized delivery Integration Tamper-resistant Security and management Audit trail Track history Electronic fax repository Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 13
  • 14. Document Delivery & Archiving:An Integrated Solution Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 14
  • 15. Open Text Fax and Document Distribution Solutions Low-risk with a high-return on investment Proven, reliable solutions Over 25 years of fax experience Secure, ensuring confidentiality, and control Tightly integrated with front and back-office applications Timely, efficient and universally accessible Easy to install, use and manage Flexible and scalable systems to match your needs Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 15
  • 16. Open Text Fax Server, RightFax Edition The market leader in fax server software Integrates and automates the flow of fax, paper, and electronic documents Makes your documents more secure and traceable Provides a complete audit trail for desktop faxing Fax over IP (FoIP) capabilities help organizations extend their VoIP networks to provide secure document delivery Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 16
  • 17. Open Text Fax Appliance, FaxPress Edition Complete network fax solution in an appliance Includes all the necessary hardware and software Immediately usable upon installation Allows users to send and receive faxes from the desktop, email, and back-end applications Integrates with most MFP’s as well The perfect solution for small to mid-size businesses or workgroups that need to maintain a high standard of security and efficiency Turnkey solutions require minimal setup and management Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 17
  • 18. Open Text Document Server, Alchemy Edition A document management software solution used by thousands of small and mid-size businesses worldwide Provides document scanning, document imaging, document archiving, fax archiving and electronic records management capabilities Creates a digital file cabinet for your organization Securely store any document type and then find it within seconds, even years later Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 18
  • 19. Open Text Workflow Server, .NET Edition Flexible, integrated, and easy-to-implement workflow solutions Creates a trusted environment where people, processes and documents can come together to improve efficiency, address compliance and increase profitability Brings new levels of productivity to any repeatable business activity from simple workgroup tasks up to enterprise wide processes Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 19
  • 20. Summary Expanding government regulations put companies at risk Open Text Fax and Document Distribution – integrated solutions that address the whole information lifecycle Solutions to fit any organizational need Trusted solutions leveraged by more than 100,000 Fax Servers in the field Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 20
  • 21. Copyright © Open Text Corporation 2008 - 2009. All rights reserved. Slide 21 Thank You