[webinar slides] 4 ways to protect your captured data from theft and compliance violations
TRANSCRIPT
![Page 1: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/1.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
#AIIMTheGlobalCommunityofInforma4onProfessionals
WebinarTitle
PresentedDATE
4WaystoProtectYourCapturedDatafromThe@andComplianceViola4ons
AnAIIMWebinardeliveredonJanuary20,2016
![Page 2: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/2.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Today’sSpeakers
MarkBrousseauPresidentBrousseau&Associates
Host:TheresaResekDirectorAIIM
![Page 3: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/3.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
WhyWeAreHere
The2015securityandcompliancewake-upcall:§ Massivedataleaks§ LostpaJentrecords§ Espionage
![Page 4: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/4.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
TheImpactofDataLeaks
§ 60%oforganizaJonssaythepotenJalimpactofadataleakwouldbehigh
§ 13%oforganizaJonssaythepotenJalimpactofadataleakwouldbedisastrous
Source:AIIM
![Page 5: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/5.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
AverageCostofaDataLeak
$7.2MILLIONSource:PonemonInsJtute
Increasingregula-onsandstandardsareraisingthestakes.
![Page 6: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/6.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
What’sAtRisk
§ CustomerinformaJon§ Intellectualproperty§ Financialrecords§ Projectdocuments
![Page 7: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/7.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Organiza4onsUnderstandtheStakes
§ 67%oforganizaJonsseeensuringtheprivacyofcustomerdataasessenJal.
§ 65%oforganizaJonsseecompliancewithindustryandgov’tregsasessenJal.
Source:AIIM
![Page 8: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/8.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
IncreasingRegulatoryPressure
14,000
Federal,stateandindustrylaws,standards
andregulaJonsgoverningthemanagementofinformaJon.
Source:CadenceGroup
![Page 9: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/9.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
ExamplesofKeyDataGovernanceRegula4ons
§ HealthInsurancePortabilityandAccountabilityAct(HIPAA)§ PaymentCardIndustryDataSecurityStandard(PCI-DSS)§ FederalInformaJonSecurityandManagementAct(FISMA)§ BankSecrecyAct(BSA)§ Gramm-Leach-BlileyAct(GLBA)§ Sarbanes-Oxley(SOX)§ DefenseInformaJonSystemsAgency(DISA)
![Page 10: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/10.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
HowOrganiza4onsareProtec4ngThemselves
49%oforganizaJonsbelieveunauthorizedaccessbyinternalstaffposesthebiggestthreattotheirdata.§ Permissionsandaccesscontrols§ AnJ-virus/malwaretools§ Strongpasswords§ Perimetersecurity
![Page 11: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/11.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
TheAchillesHeel:DocumentImagingSystems
AtypicaldocumentimagingsystemcancreateFOUR
vulnerabiliJesthatincreasethepotenJalfordatathe@andviola4onsofinformaJonmanagementregulaJons.
![Page 12: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/12.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#1:PryingEyes
NoencrypJonwhiledataisinmoJonandnoprotecJonforimagesordataastheytravelthroughthecaptureworkflow.
![Page 13: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/13.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#1:PryingEyes
MostdocumentimagingsystemshavenotmadetheleaptofulldiskencrypJon.
![Page 14: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/14.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#1:PryingEyes
OperatorshavenetworkorfilesystemrightstothelocaJonwhereimagesarewri(en.
![Page 15: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/15.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#1:PryingEyes
Imagesarewri(entothescanner’slocalharddriveprior
towriJngthedatatoanetworkfilerepository.
![Page 16: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/16.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#2:LogFilesLe@Unsecured
Mostdocumentimaging
systemswritebatchlogfilestothelocalharddriveofthe
scanner’shostPC.
![Page 17: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/17.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#2:LogFilesLe@Unsecured
LogfilesmaycontainPersonalInformaJon(PI)orPersonalHealthInformaJon(PHI)suchascheck
MICRinformaJonorOCR/ICRresultsfrommedicalforms.
![Page 18: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/18.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#3:PoorVisibilityintoOperatorAc4vi4es
DifficultytrackingandaudiJngtheacJviJesofoperaJonal
staff.
![Page 19: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/19.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Risk#4:PoorSecurityManagement
Mostdocumentimagingsystemsrequiremanualprocessesfornetworkadministratorstoreview
securityseings.
![Page 20: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/20.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
ELIMINATETHESERISKSHOWADVANCEDDOCUMENTIMAGINGSYSTEMS
![Page 21: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/21.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#1:“Impersona4on”
Dataiswri(entoadifferentuseraccountthantheone
usedbythescanneroperator.
![Page 22: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/22.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#2:ProtectedImagesandData
StrongencrypJonalgorithmsthatdonotimpactsystem
performance.
![Page 23: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/23.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#2:ProtectedImagesandData
UseofInternetProtocolSecurity(IPSec)tunnelsto
encryptdatathatisinmoJon.
![Page 24: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/24.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#2:ProtectedImagesandData
Temporaryimagesarestoredonlyinmemorypriortobeingwri(entothenetworkstore.
![Page 25: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/25.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#3:SecureAuditLogging
Detailedauditloggingtoacustomer’ssyslogserver.
![Page 26: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/26.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#3:SecureAuditLogging
Batchlogfilesarewri(endirectlytoauser’snetwork,insteadoftoalocaldrive.
![Page 27: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/27.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#3:SecureAuditLogging
NosensiJveinformaJonisincludedinlogfiles.
![Page 28: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/28.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Safeguard#4:StrongSecurityManagement
AsecuritycontrolpanelthatprovidesinsightsandeasycontrolofconfiguraJons.
![Page 29: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/29.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
Summary
§ Securityandcomplianceisonthecorporateagenda§ OrganizaJonsknowtheymustworkhardertoprotectcontent§ MostscanningsystemscreateFOURvulnerabiliJes§ Advancedcapturesystemseliminatetheseissueswhile
aligningdocumentprocessingwithcorporatesecuritygoals
![Page 30: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/30.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
ibml
ibmlprovidesintelligentinformaJoncapturesoluJonsthatdrivebusinessprocessimprovements.Combiningintelligentscanners,somwareandservices,ibml’scomprehensivesoluJonsautomatethemostdemandingdocumentapplicaJonsinbanking,financialservices,healthcare,governmentservices,outsourcingandmore.Everyday,ibmlcustomersin48countriesrelyonourtechnologytoaccurately,efficientlyandsecurelycaptureandprocessmillionsofdocuments.Learnmoreatwww.ibml.com
![Page 31: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/31.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
SecureDocumentCaptureSolu4ons
FormoreinformaJon,emailDanLucariniat
![Page 32: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/32.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
#AIIMTheGlobalCommunityofInforma4onProfessionals
TakeyourskillstothenextlevelbylearningbestpracJcesandtechnologiesfordigitalimagingwithAIIM’sCapture&Imagingtrainingcourse.
Visit:AIIM.org/CaptureTraining
![Page 33: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations](https://reader035.vdocument.in/reader035/viewer/2022070603/5872c0321a28ab0c718b5155/html5/thumbnails/33.jpg)
Underwri(enby: Presentedby: Brousseau&Assoc.
AIIMistheCommunityforInforma4onProfessionals
AIIMbelievesthatinforma4onisyourmostimportantasset–learntheskillstomanageit.
Ourmissionistoimprove
organizaJonalperformancebyempoweringacommunityofleaderscommi(edtoinformaJon-driven
innovaJon.
Learnmoreatwww.aiim.org