Document Management - White Paper (ID 5277).pdf Jul. 2014 | Page 15

Privacy of Company Information Companies implement server firewalls and anti-virus solutions to protect against potential security threats from the outside. Yet research shows the biggest source of data tampering (as well as the most financially damaging) comes from the inside. According to respected industry research firm Gartner, company employees are usually the culprits of unauthorized access -- 70% of the time4. Perhaps more troubling, employee cases comprise 95% of the breaches that cause a company significant financial losses. Placing company documents into a paperless environment is the best method of gaining control over internal data security. Talk of “data” in the context of information leaks makes one think of only digital content, but actually 49% of the reported access violations involve paper files, according to a survey by Ponemon5. Paper files are particularly vulnerable to information breaches because it is difficult to know where a paper document has been, who has seen it, or for that matter, whether it is missing or just misplaced. Migrating to an all-digital format gives companies a platform on which to establish effective security controls. The same Ponemon study also makes a distinction between different types of digital data. ‘Unstructured’ data -- the files scattered among hard drives, laptops, and servers in standard Windows folders -- constitute the low-hanging fruit for data violators. These unstructured files are not embedded into any kind of document management system to track their usage or control their access. People can view, copy, or delete content without anyone knowing. By contrast, a document management system will structure company documents into a single system that logs the history of user actions. Structuring company files also enables password protection on sets of important documents. An administrator can make certain documents available only for certain managers (such as the head of HR for personnel files) or for a whole department of users (i.e., engineers for CAD design files) and exclude others from viewing or editing operational documents. The administrator can also define access permission rules for recurring documents to ensure protection is consistently applied to potentially sensitive material. When managers have the ability to audit a trail of documen Ё