SlideShare une entreprise Scribd logo
1  sur  28
The Business Case for Document Integrity A presentation fromCrawford Technologies Inc. www.crawfordtech.com Follow, Like and Join us at about.me/CrawfordTechInc
Definitions & Terms The Problem the business case couldn’t be built The Two Drivers of Your Business Case: Quantifiable Benefits Costs The Benefits of Document Integrity have Increased The Costs of Document Integrity have Decreased Conclusion & Wrap up Agenda
Definitions & Terms ADF “An architecture for efficiently and cost-effectively producing internal and external printed transaction documents” “To ensure lower costs, higher quality, integrity and process controls”
Definitions & Terms ADF Defined and named by Gartner in 1995 as: Input – the data enters the ADF Transformation & Integrated Output – production onto appropriate media Delivery Preparation – documents are prepared for delivery to the recipient Control & Reporting – production management of the ADF - sits over the other 3 modules The Interfaces between the 4 modules
ADF 2.0 (Gartner 2007) adds two new modules: Document Design and Content Integration – Business rule design & placement of all variable data & messaging components Response Management – Ongoing analysis of customer behaviors to maximize customer lifetime value Definitions & Terms
Definitions & Terms Document Integrity: A service level quality standard that transactional document production is measured against. It specifically measures the quantity of ‘co-mingles’ and other privacy related document production errors. It is measured in %, for example, “99.5% error free of document integrity errors”. ,[object Object]
A system that uses camera technology to visually inspect the physical production of transactional customer documents. It monitors, tabulates and reports on all activities to significantly reduce errors.,[object Object]
In response, many organizations are demanding significant “proof of process” reporting and evidence that appropriate processes, best practices and appropriate controls are in place.
This applies to internal operations and print service providers.,[object Object]
Business cases for acquisition, installation and operation of a Document Integrity system have often failed to receive approval. ,[object Object]
The cost of poor document integrity has not often been fully quantified
The cost to acquire a document integrity system has historically been very expensive.
The vendor fees to integrate, install and configure a document integrity system have traditionally been very expensive.The Problem
The Two Drivers of your Business Case: Quantifiable Benefits & Costs A traditional business case is typically measured either by its Return on Investment (ROI) or its Payback. ,[object Object]
For example the Payback for a traditional Document Integrity project may be 15 months.,[object Object]
For example, the ROI for the Document Integrity Project is 12%.
Remember that your project will be measured financially against other projects in your organization and your project will be ranked against them using ROI, Payback or some other financial method.,[object Object]
Postage?
Overtime?
Production Costs?
Labor?
Other?,[object Object]
Performance penalties, if you are a service provider,[object Object]
The Benefits of Document Integrity Have Increased For example: your customer is not profitable until year 4 and then profitability accumulates quickly due to cross purchasing, upgrading and by recommending your companies products and services to friends and family So what happens when a customer leaves after 3.5 years due to a privacy breach? You have lost money on that customer and the replacement customer will lose you money once you acquire them Customer Lifetime Value will strengthen your business case.
The Benefits of Document Integrity Have Increased Customer Lifetime Value – costs and profits “It costs a wireless phone company at least $300 to acquire a consumer client and upwards of $60,000 to acquire a corporate client” - Peppers & Rogers “A 5% increase in customer loyalty can translate to a 75% increase in profitability” - Gartner Group “It costs 5 to 10 times as much to get a customer than to keep a customer” - Harvard Business School Customer Lifetime Value for the banking industry runs at between $140 to $220 per client (profit) - Database Marketing Institute Customer Lifetime Value for the insurance industry runs at around $5,500 per client (profit) - University of Groningen
Costs Have Come Down New Document Integrity systems are now available at costs that are significantly lower than in the past Costly upgrades to intelligent inserters are not required.  Long, complex installation projects are not required.  Large professional services bills can be avoided. These systems automatically reprint damaged pieces. These systems can automatically improve production efficiency These systems can automatically prepare your existing work for an integrity system. Add barcodes, create tracking files, etc. These systems significantly reduce document integrity errors with Six Sigma-class document integrity quality rates!
Conclusions and Wrap Up The quantifiable benefits of reducing document integrity errors are now more measurable than ever.  You can now improve the monetary benefits aspect of your Payback and ROI calculations by including lifetime value data and by including new efficiency gains  The one time capital costs and professional services fees have come down significantly, as have the ongoing maintenance and support fees. Reduced Costs and Increased Monetary Benefits mean that you can now have a winning business case!  Now is the time to rebuild your business case to improve document integrity in your organization. Make sure this is in your budget for next year!
US and International Privacy Laws State, Federal and International Privacy Laws - Courtesy of: White Space Marketing. Inc.  The following list contains a number of US Federal privacy related laws: Americans with Disabilities Act (ADA) - Primer for business.  Cable Communications Policy Act of 1984 (Cable Act)  California Senate Bill 1386 (SB 1386) - Chaptered version.  Children's Internet Protection Act of 2001 (CIPA)  Children's Online Privacy Protection Act of 1998 (COPPA)  Communications Assistance for Law Enforcement Act of 1994 (CALEA) - Official CALEA website.  Computer Fraud and Abuse Act of 1986 (CFAA) law summary. Full text at Cornell  Computer Security Act of 1987 - (Superseded by the Federal Information Security Management Act (FISMA) Consumer Credit Reporting Reform Act of 1996 (CCRRA) - Modifies the Fair Credit Reporting Act (FCRA).

Contenu connexe

Tendances

ITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseSamanage
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Maru Schietekat
 
How to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyHow to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyNeoStreamTech
 
Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...3gamma
 
Why should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementWhy should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementGilles Declercq
 
Research paper on EDI
 Research paper on EDI  Research paper on EDI
Research paper on EDI Ankur Wani
 
Rethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingRethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingBARRY ROSS
 
Navigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingNavigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingLogikcull
 
Innovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsInnovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsSachaWalsh
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Legal_Tech_Report_2016
Legal_Tech_Report_2016Legal_Tech_Report_2016
Legal_Tech_Report_2016Temelko Dechev
 
e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...The Digital Group
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningPolsinelli PC
 
The Added Value of Business Consolidation
The Added Value of Business ConsolidationThe Added Value of Business Consolidation
The Added Value of Business Consolidationeprentise
 
White Paper Automate Contract Workflows
White Paper Automate Contract WorkflowsWhite Paper Automate Contract Workflows
White Paper Automate Contract Workflowselixenne
 

Tendances (19)

The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
ITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseITSM SaaS vs. On-Premise
ITSM SaaS vs. On-Premise
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
 
How to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyHow to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case Study
 
Enterprise EDI Integration
Enterprise EDI IntegrationEnterprise EDI Integration
Enterprise EDI Integration
 
Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...
 
Why should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementWhy should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurement
 
Research paper on EDI
 Research paper on EDI  Research paper on EDI
Research paper on EDI
 
Rethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingRethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs Outsourcing
 
Navigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingNavigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery Billing
 
Innovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsInnovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firms
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
EDI makes money
EDI makes moneyEDI makes money
EDI makes money
 
Legal_Tech_Report_2016
Legal_Tech_Report_2016Legal_Tech_Report_2016
Legal_Tech_Report_2016
 
Healthcare HIPAA Edi x12 basics 1
Healthcare HIPAA Edi x12 basics 1Healthcare HIPAA Edi x12 basics 1
Healthcare HIPAA Edi x12 basics 1
 
e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
The Added Value of Business Consolidation
The Added Value of Business ConsolidationThe Added Value of Business Consolidation
The Added Value of Business Consolidation
 
White Paper Automate Contract Workflows
White Paper Automate Contract WorkflowsWhite Paper Automate Contract Workflows
White Paper Automate Contract Workflows
 

Similaire à The Business Case for Document Integrity

Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality ProjectsInnovative_Systems
 
Ensur= let's get phygital
Ensur= let's get phygitalEnsur= let's get phygital
Ensur= let's get phygitalComarch
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
ILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal TechnologyILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal Technologygrudoy
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"Peter Coffee
 
iTEMize - TEM
iTEMize - TEMiTEMize - TEM
iTEMize - TEMamelmed
 
Peter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee
 
Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Company Spotlight
 
Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Company Spotlight
 
T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...The Digital Group
 
ROI Document Management White Paper
ROI Document Management White PaperROI Document Management White Paper
ROI Document Management White PaperLarry Levine
 
4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docxblondellchancy
 
Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Crawford Technologies, Inc.
 
Up to Your Assets in Technology?
Up to Your Assets in Technology?Up to Your Assets in Technology?
Up to Your Assets in Technology?Avaya Inc.
 
Topic 1 enterprise pressures and the need for services innovation
Topic 1   enterprise pressures and the need for services innovationTopic 1   enterprise pressures and the need for services innovation
Topic 1 enterprise pressures and the need for services innovationZaheer Travadi
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case studyWGroup
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 

Similaire à The Business Case for Document Integrity (20)

Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality Projects
 
Ensur= let's get phygital
Ensur= let's get phygitalEnsur= let's get phygital
Ensur= let's get phygital
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
ILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal TechnologyILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal Technology
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
iTEMize - TEM
iTEMize - TEMiTEMize - TEM
iTEMize - TEM
 
Peter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee on Cloud Transformation
Peter Coffee on Cloud Transformation
 
Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Direct Insite Presentation December 2013
Direct Insite Presentation December 2013
 
Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013
 
T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...
 
ROI Document Management White Paper
ROI Document Management White PaperROI Document Management White Paper
ROI Document Management White Paper
 
4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx
 
Boeing
BoeingBoeing
Boeing
 
Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management
 
Up to Your Assets in Technology?
Up to Your Assets in Technology?Up to Your Assets in Technology?
Up to Your Assets in Technology?
 
Topic 1 enterprise pressures and the need for services innovation
Topic 1   enterprise pressures and the need for services innovationTopic 1   enterprise pressures and the need for services innovation
Topic 1 enterprise pressures and the need for services innovation
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case study
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 

Plus de Crawford Technologies, Inc.

38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing ItCrawford Technologies, Inc.
 
Inkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryInkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryCrawford Technologies, Inc.
 
Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Crawford Technologies, Inc.
 
33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing ItCrawford Technologies, Inc.
 
33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing ItCrawford Technologies, Inc.
 
3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations EfficiencyCrawford Technologies, Inc.
 

Plus de Crawford Technologies, Inc. (11)

38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It
 
Inkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryInkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper Factory
 
Crawford Technologies Overview 2014
Crawford Technologies Overview 2014Crawford Technologies Overview 2014
Crawford Technologies Overview 2014
 
Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...
 
33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It
 
33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It
 
Legacy Print Streams - What's the Big Deal?
Legacy Print Streams - What's the Big Deal?Legacy Print Streams - What's the Big Deal?
Legacy Print Streams - What's the Big Deal?
 
Transpromo on a Budget
Transpromo on a Budget Transpromo on a Budget
Transpromo on a Budget
 
Crawford Technologies Overview January 2011
Crawford Technologies Overview January 2011Crawford Technologies Overview January 2011
Crawford Technologies Overview January 2011
 
3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency
 
Xerox Print Datastreams
Xerox Print DatastreamsXerox Print Datastreams
Xerox Print Datastreams
 

Dernier

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

The Business Case for Document Integrity

  • 1. The Business Case for Document Integrity A presentation fromCrawford Technologies Inc. www.crawfordtech.com Follow, Like and Join us at about.me/CrawfordTechInc
  • 2. Definitions & Terms The Problem the business case couldn’t be built The Two Drivers of Your Business Case: Quantifiable Benefits Costs The Benefits of Document Integrity have Increased The Costs of Document Integrity have Decreased Conclusion & Wrap up Agenda
  • 3. Definitions & Terms ADF “An architecture for efficiently and cost-effectively producing internal and external printed transaction documents” “To ensure lower costs, higher quality, integrity and process controls”
  • 4. Definitions & Terms ADF Defined and named by Gartner in 1995 as: Input – the data enters the ADF Transformation & Integrated Output – production onto appropriate media Delivery Preparation – documents are prepared for delivery to the recipient Control & Reporting – production management of the ADF - sits over the other 3 modules The Interfaces between the 4 modules
  • 5. ADF 2.0 (Gartner 2007) adds two new modules: Document Design and Content Integration – Business rule design & placement of all variable data & messaging components Response Management – Ongoing analysis of customer behaviors to maximize customer lifetime value Definitions & Terms
  • 6.
  • 7.
  • 8. In response, many organizations are demanding significant “proof of process” reporting and evidence that appropriate processes, best practices and appropriate controls are in place.
  • 9.
  • 10.
  • 11. The cost of poor document integrity has not often been fully quantified
  • 12. The cost to acquire a document integrity system has historically been very expensive.
  • 13. The vendor fees to integrate, install and configure a document integrity system have traditionally been very expensive.The Problem
  • 14.
  • 15.
  • 16. For example, the ROI for the Document Integrity Project is 12%.
  • 17.
  • 22.
  • 23.
  • 24. The Benefits of Document Integrity Have Increased For example: your customer is not profitable until year 4 and then profitability accumulates quickly due to cross purchasing, upgrading and by recommending your companies products and services to friends and family So what happens when a customer leaves after 3.5 years due to a privacy breach? You have lost money on that customer and the replacement customer will lose you money once you acquire them Customer Lifetime Value will strengthen your business case.
  • 25. The Benefits of Document Integrity Have Increased Customer Lifetime Value – costs and profits “It costs a wireless phone company at least $300 to acquire a consumer client and upwards of $60,000 to acquire a corporate client” - Peppers & Rogers “A 5% increase in customer loyalty can translate to a 75% increase in profitability” - Gartner Group “It costs 5 to 10 times as much to get a customer than to keep a customer” - Harvard Business School Customer Lifetime Value for the banking industry runs at between $140 to $220 per client (profit) - Database Marketing Institute Customer Lifetime Value for the insurance industry runs at around $5,500 per client (profit) - University of Groningen
  • 26. Costs Have Come Down New Document Integrity systems are now available at costs that are significantly lower than in the past Costly upgrades to intelligent inserters are not required. Long, complex installation projects are not required. Large professional services bills can be avoided. These systems automatically reprint damaged pieces. These systems can automatically improve production efficiency These systems can automatically prepare your existing work for an integrity system. Add barcodes, create tracking files, etc. These systems significantly reduce document integrity errors with Six Sigma-class document integrity quality rates!
  • 27. Conclusions and Wrap Up The quantifiable benefits of reducing document integrity errors are now more measurable than ever. You can now improve the monetary benefits aspect of your Payback and ROI calculations by including lifetime value data and by including new efficiency gains The one time capital costs and professional services fees have come down significantly, as have the ongoing maintenance and support fees. Reduced Costs and Increased Monetary Benefits mean that you can now have a winning business case! Now is the time to rebuild your business case to improve document integrity in your organization. Make sure this is in your budget for next year!
  • 28. US and International Privacy Laws State, Federal and International Privacy Laws - Courtesy of: White Space Marketing. Inc. The following list contains a number of US Federal privacy related laws: Americans with Disabilities Act (ADA) - Primer for business. Cable Communications Policy Act of 1984 (Cable Act) California Senate Bill 1386 (SB 1386) - Chaptered version. Children's Internet Protection Act of 2001 (CIPA) Children's Online Privacy Protection Act of 1998 (COPPA) Communications Assistance for Law Enforcement Act of 1994 (CALEA) - Official CALEA website. Computer Fraud and Abuse Act of 1986 (CFAA) law summary. Full text at Cornell Computer Security Act of 1987 - (Superseded by the Federal Information Security Management Act (FISMA) Consumer Credit Reporting Reform Act of 1996 (CCRRA) - Modifies the Fair Credit Reporting Act (FCRA).
  • 29. US and International Privacy Laws The following list contains a number of US Federal privacy related laws (continued): Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 law overview. Text of law at Cornell library Electronic Funds Transfer Act (EFTA) Summary Fair and Accurate Credit Transactions Act (FACTA) of 2003 Fair Credit Reporting Act (Full Text). Federal Information Security Management Act (FISMA) Federal Trade Commission Act (FTCA) Driver's Privacy Protection Act of 1994 . Text of law at Cornell Electronic Communications Privacy Act of 1986 (ECPA) Electronic Freedom of Information Act of 1996 (E-FOIA) Discussion as it related to the Freedom of Information Act.
  • 30. US and International Privacy Laws The following list contains a number of US Federal privacy related laws (continued): Fair Credit Reporting Act of 1999 (FCRA) Family Education Rights and Privacy Act of 1974 (FERPA; also know as the Buckley Amendment) Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) Privacy Act of 1974 - including U.S. Department of Justice Overview Privacy Protection Act of 1980 (PPA) Right to Financial Privacy Act of 1978 (RFPA) Telecommunications Act of 1996 Telephone Consumer Protection Act of 1991 (TCPA) Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) Video Privacy Protection Act of 1988 discussion and overview. Text of law at: Cornell Law Library
  • 31. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Argentina: Personal Data Protection Act of 2000 (aka Habeas Data) Austria: Data Protection Act 2000, Austrian Federal Law Gazette part I No. 165/1999 (Datenschutzgesetz 2000 or DSG 2000). Australia: Privacy Act of 1988 Belgium: Belgium Data Protection Law and Belgian Data Privacy Commission Privacy Blog Brazil: Privacy currently governed by Article 5 of the 1988 Constitution. Bulgaria: The Bulgarian Personal Data Protection Act, was adopted on December 21, 2001 and entered into force on January 1, 2002. More information at the Bugarian Data Protection Authority Canada: The Privacy Act - July 1983 Personal Information Protection and Electronic Data Act (PIPEDA) of 2000 (Bill C-6) Chile: Act on the Protection of Personal Data, August 1998
  • 32. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Colombia: Two laws affecting data privacy - Law 1266 of 2008: (in Spanish) and Law 1273 of 2009 (in Spanish) Also, the constitution provides any person the right to update their personal information Czech Republic: Act on Protection of Personal Data (April 2000) No. 101 Denmark: Act on Processing of Personal Data, Act No. 429, May 2000. Estonia: Personal Data Protection Act of 2003. June 1996, Consolidated July 2002. European Union: European Union Data Protection Directive of 1998 EU Internet Privacy Law of 2002 (DIRECTIVE 2002/58/EC) With a discussion here. Finland: Act on the Amedment of the Personal Data Act (986) 2000. France: Data Protection Act of 1978 (revised in 2004)
  • 33. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Germany: Federal Data Protection Act of 2001 Greece: Law No.2472 on the Protection of Individuals with Regard to the Processing of Personal Data, April 1997. Guernsey: Data Protection (Bailiwick of Guernsey) Law of 2001 Hong Kong: Personal Data Ordinance (The "Ordinance") Hungary: Act LXIII of 1992 on the Protection of Personal Data and the Publicity of Data of Public Interests (excerpts in English). Iceland: Act of Protection of Individual; Processing Personal Data (Jan 2000) Ireland: Data Protection (Amendment) Act, Number 6 of 2003 India: Information Technology Act of 2000 Italy: Data Protection Code of 2003 Italy: Processing of Personal Data Act, January 1997 Japan: Personal Information Protection Law (Act) (Official English Translation) Law Summary from Jonesday Publishing Japan: Law for the Protection of Computer Processed Data Held by Administrative Organs, December 1988.
  • 34. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Korea - Act on Personal Information Protection of Public Agencies Act on Information and Communication Network Usage Latvia: Personal Data Protection Law, March 23, 2000. Lithuania: Law on Legal Protection of Personal Data (June 1996) Luxembourg: Law of 2 August 2002 on the Protection of Persons with Regard to the Processing of Personal Data. Malaysia - Common Law principle of confidentiality Draft Personal data Protection Bill (Not finalized) Banking and Financial Institutions Act of 1989 privacy provisions. Malta: Data Protection Act (Act XXVI of 2001), Amended March 22, 2002, November 15, 2002 and July 15, 2003 Morroco: Data Protection Act Netherlands: Personal Data Protection Act 2000 New Zealand: Privacy Act, May 1993; Privacy Amendment Act, 1993; Privacy Amendment Act, 1994 Norway: Personal Data Act (April 2000) - Act of 14 April 2000 No. 31 Relating to the Processing of Personal Data (Personal Data Act) Philippines: No general data protection law, but there is a recognized right of privacy in civil law.
  • 35. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Romania: Law No. 677/2001 for the Protection of Persons concerning the Processing of Personal Data and the Free Circulation of Such Data Poland: Act of the Protection of Personal Data (August 1997) Portugal: Act on the Protection of Personal Data (Law 67/98 of 26 October) Singapore - The E-commerce Code for the Protection of Personal Information and Communications of Consumers of Internet Commerce. Other related Singapore Laws and E-commerce Laws . Slovak Republic: Act No. 428 of 3 July 2002 on Personal Data Protection. Slovenia: Personal Data Protection Act , RS No. 55/99. South Korea: The Act on Promotion of Information and Communications Network Utilization and Data Protection of 2000 Spain: ORGANIC LAW 15/1999 of 13 December on the Protection of Personal Data
  • 36. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Spain: ORGANIC LAW 15/1999 of 13 December on the Protection of Personal Data Switzerland: The Federal Law on Data Protection of 1992 Sweden: Personal Data Protection Act (1998:204), October 24, 1998 Taiwan: Computer Processed Personal data Protection Law - applies only to public institutions. Thailand: Official Information Act (1997) for state agencies. ( Personal data Protection bill under consideration.) United Kingdom: UK Data Protection Act 1998 Privacy and Electronic Communications (EC Directive) Regulations 2003 official text, and a consumer oriented site at the Information Commissioner's Office. Vietnam: The Law on Electronic Transactions 2008
  • 37. You’ve been watching:The Business Case for Document Integrity Connect with us on Twitter Facebook LinkedIn Visit about.me/CrawfordTechInc now