SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
eSignatures:
Balancing User Experience and
Security Compliance at Scale
Impression Signatures
The cost of getting it wrong
Cyber incidents, data breaches and business interruption
• The average cyber incident costs an organisation $ 400 000.00
• ENS Africa Hit with Costs (R5.5 mil) for Online Security Hack
• Recent GDPR data breach fines and pay-outs:
• T-Mobile $350 Million pay-out - Personal data breach
• Equifax $700 Million pay-out - Personal data breach
• Interserve € 5 Million fine - Insufficient technical and organisational measures to ensure
information security
• Clearview AI - € 20 Million fine per country - Insufficient fulfilment of data subjects rights
• Meta Platforms - € 405 Million fine - Non-compliance with general data processing
principles
• https://www.enforcementtracker.com/
• Some companies have taken years to recover from data breaches
• Recovering from the reputational damage of a public incident
Paper Based Process
Your Opportunities
Getting it right from the start to prevent opportunities for
fraud, abuse and data security violations
Digitizing from the first interaction
eSignatures allow processes that are usually paper based to be digitized from the start
Customers don’t have to
feel the complexity of
your need for identity
certainty
Welcome,
to sign this
securely we
need to verify
you!
Here’s your
agreement,
please keep this
safe!
We need to
make sure it’s
really you!
The information
in this
agreement is
private!
Do we have
your consent?
1 5
4
3
2
Customers are more likely to grant consent for intrusive
biometric verification as part of the onboarding process
Digital Identity in 5 steps
Maximizing the value of a single interaction
eSignatures allow single touch interactions to enable multiple digital processes
Prevent fraud before it starts
Learn from our Insurance customers experience
Certainty of identity & non-repudiable
contracting
Propensity for fraud, credit checks, sim
swap & bank account verification
Automation, auditability, AI driven
processing & voice lie detection
Manual validation, fraud investigation
& evidence for prosecution
Integrations and platforms
Embedded and connected with subject matter experts
Microsoft Ecosystem
• Word
• Excel
• Outlook
• SharePoint
• One Drive
• Adobe
Process Management
• Sybrin Onboarding
• AppWorks
• Oracle
• Salesforce
• SAP
• XDS
• Striata
Document Management
• Sybrin Nitro
• OpenText
• OnBase
• DocFusion
Your Obligations
What healthcare service providers need to do to be compliant
Credit Relevant Legislation Cases
Credit compliance spans several pieces of RSA legislation
The National Credit Act describes which particulars need
to be included on every credit agreement.
Section 2.
(3) If a provision of this Act requires a document to be
signed or initialled by a party
(a) (a) an advanced electronic signature, as defined in
the Electronic Communications Act, 2002 (Act No.
25 of 2002); or
(b) (b) an electronic signature as defined in the
Electronic Communications Act, 2002 (Act No. 25 of
2002), provided that-
(a) (i) the electronic signature is applied by each
party in the physical presence of the other party
or an agent of the party; and
(b) (ii) the credit provider must take reasonable
measures to prevent the use of the consumer’s
electronic signature for any purpose other than
the signing or initialling of the particular
document that the consumer intended to sign
or initial.
Advanced Electronic Signatures are defined in the
Electronic Communications and Transactions Act, 2002
(Act No. 25 of 2002) as:
• An electronic signature which results from a
process which has been accredited by the
Accreditation Authority.
Section 37 and 38 of the Act stipulate the criteria for
accreditation:
(Section 38.1) - The electronic signature:
• is uniquely linked to the signer;
• is capable of identifying the signer;
• is created under a means that can be maintained
under the sole control of the signer;
• will be linked to the data or data message to
which it relates in such a manner that any
subsequent change of data or data message is
detectable;
*Advanced Electronic Signature is the South
African equivalent to QES
Consent & Agreement
The intersection of privacy and proof of intent
• Always keep a record of any consent, agreement or notification
• Don’t use consent where you should use a contract
• Don’t notify where you should get consent, always notify of data
processing activities
• Provide a closed loop process where agreements cannot be altered
• Track signatory’s interactions with the agreement to prove intent
Contracting parties & Identity
Compliance and trust require that all parties are identified
• Ensure that both or all parties to a contract are identifiable,
during and after the signing ceremony for the contract to be
valid
• Ensure that you know your customer or intended signatory
• Ensure that the agreement is only available to the intended
signatory
• Layer controls to ensure that only the signatory can access
and apply their signature
Restrict alteration after signing
Technical controls must be in place to ensure integrity
• Ensure that documents are stored in an immutable format, like PDF
• Digitally sign completed documents to prevent tampering
• Highlight any attempts at alteration or tampering after signing
• Provide technical proof of a document original with singing evidence
• Signatory identifying information
• Annotations made during signing
• Signing workflow or approvals
Provide proof of compliance
Proof of compliance is required from the sending party
• Understand consent and agreement requirements within existing
processes and solutions
• Create secure consent, agreement and approval processes that do not
allow for unintended intervention or alteration
• Provide technical proof of the signing process, workflow and signatory
interactions
• Make technical audit trails easily understood through a Chain of Custody
Certificate
Securely store records for legislated periods
Medical information is deeply sensitive and must be secured
• Understand what data must be kept for what period of time
• Ensure that communications around this data are sensitive and do not
reveal anything that can be used to identify the patient, or prejudice them
in any way
• Do not store data beyond its useful life or required period
• Destroy data that is no longer required
• Secure networks, systems and storage appropriately to prevent cyber
incidents
Presenting a New Standard | Cloud Signature Consortium (CSC) Membership
► How can digital trust services lead the way for digital transformation in your region? And,
how can CSC play a role?
We hold a valued membership at the Cloud signature consortium where we have seats on the
Technical, Advocacy and Marketing Committees.
Membership has afforded us the opportunity to participate in the development of a new
standard to check conformance with the CSC Conformance Checker, API v2.0.
Officially being released to the public XXXXX [Confirm Date]
Details can be found here:
https://cloudsignatureconsortium.org/join-us/associate-membership/
WebTrust Assurance
The WebTrust Audit program is based on the following Trust
Services Principles and Criteria
Security The system is protected against unauthorized access (both physical
and logical).
Availability The system is available for operation and use as committed or
agreed.
Processing Integrity System processing is complete, accurate, timely, and authorized.
Online Privacy Personal information obtained as a result of e-commerce is
collected, used, disclosed, and retained as committed or agreed.
Confidentiality Information designated as confidential is protected as committed or
agreed.
https://cabforum.org/wp-content/uploads/WTBR2_2.pdf
WebTrust Assurance
Standards and security control framework
3rd Party Annual Audit
• KPMG independent audit against
global framework
• Auditors are granted the right to
conduct the audit
• Evaluate controls for effectiveness,
and then evaluate actual
adherence to controls
Controls evaluated
• Physical & Logical security
• Availability & Business continuity
• Incident management
• System development & practices
• Risk management practices
• Asset classification & management
• Access management & Personnel
security
Standards
• ISO - International Organization for
Standardization
• ETSI - European Telecommunications
Standards Institute
• ANSI - American National Standards
Institute
• CAB Forum – Certificate
Authority/Browser Forum
Examples
Industry insights, use cases and return on investment
Agreements
are
Everywhere Sales
▪ Sales Order Processing
▪ Customer Account
Provisioning
▪ Special Deal Terms
▪ Referral Agreements
▪ Partner Agreements
▪ Reseller Agreements
▪ Sales Support
▪ Loan Documents
▪ Support Agreements &
Renewals
▪ Commission Forms
▪ Upgrade Application
▪ Downgrade Agreement
Marketing
▪ Event Registration
▪ Customer Communication
Approvals
▪ Mass Mailing/Email Approval
▪ Event Vendor Agreements
▪ Rebate Agreements
▪ Sponsorship Agreements
▪ Promotion Agreements
▪ Advertising Contracts
▪ Press Release Approvals
▪ Brand Licensing Agreements
▪ Media Plan Sign-off
Services
▪ Account Change
▪ Service/Work Orders
▪ Terms Change
▪ Self-Service Requests
▪ Compliance
▪ Field Service
▪ New Policy Applications
▪ Policy Cancellations /
Suspensions
▪ Independents Agency
Licensing
▪ EFT Authorization
Human Resources
▪ Offer Letters
▪ New hire paperwork
▪ Candidate NDA
▪ On/Off-boarding checklist
▪ Employee Policy Distribution
& Signature
▪ Contract Agreements
▪ Non-disclosure
▪ PTO Management
▪ Performance Appraisal
▪ Background Checks
▪ Leave Forms
▪ Grievance Forms
▪ Letter of warning Form
Finance
▪ Invoice Processing
▪ Expense Processing
▪ Capitalisation Management
▪ Audit Sign-off
▪ Policy Management
▪ Inventory sign-off
▪ Asset Transfer/Retirement
▪ Grant Applications
▪ Sales & Use Tax return
▪ Consumer Account opening
▪ Deposit products
IT/Operations
▪ Asset tracking
▪ Change requests
▪ Requirements Sign-off
▪ Access Management
▪ Incident Reporting
▪ Production Change
Authorisation
▪ Maintenance Authorisation
▪ Authorisation
▪ Real Estate Approval
▪ Project Budget Approvals
▪ Asset Purchase Form
▪ Software Purchase Form
Legal
▪ NDA’s
▪ Contract Management
▪ Internal Compliance
▪ IP Licensing
▪ Patent Applications
▪ Board minutes
▪ Affidavits
▪ Summons
▪ Engagement Letters
▪ Memoranda of
Understanding
▪ Change of Ownership
▪ Share Purchase
Facilities
▪ Front Desk Sign-in
▪ Work Orders
▪ Lease Agreements
▪ Move In/Out Requests
▪ Parking Permits
▪ Building Maintenance
▪ Construction CAD Drawings
▪ Equipment Load Agreements
▪ Change Justification Forms
▪ Building Permits
▪ Change Orders
Product Management
▪ Change Management
▪ Release Management
▪ Code Review Reporting
▪ Requirements Acceptance
▪ Release Scope Commitment
▪ Policy Approval
▪ SDK Agreements
▪ Developer Program
Enrolment
▪ Product Development
Methods
▪ New Product Evaluation
▪ New Offering Announcement
Procurement
▪ Purchase Order
▪ Statement of Work
▪ Master Services Agreement
▪ RFP Sign-Off
▪ Supplier Compliance
▪ Service Level Agreements
▪ Termination Letters
▪ Software Licence Agreements
▪ Rate Cards
▪ Invoice Processing
▪ Subcontractor Agreements
▪ Vendor Contracts
Logistic Workflow Example - Paper
Logistic Workflow Example - Digital
Gym Onboard Workflow Example
Customer opts to take up Insurance
Our Platform
Accredited, Secure, Embedded & Everywhere you work
Return on digitisation
A few of the things we’ve seen our customers achieve
• Improved process & regulatory compliance
• Entire company secretarial functions digitised
• Governance, Risk & Compliance function digitised
• Time savings through efficiencies
• Requirement for printing eliminated
• Signed documents returned within hours or days
• Operational processes reduced from weeks to hours
• Reduced costs
• Paper & printing – R3mil a month in a single division of Absa
• Cost savings passed to customers
• Administration staff redeployed into skilled roles
• Rapid implementation
• 2 – 3 weeks integrated deployment at many large customers
• Instant adoption on internal use
• Phased embedding into own infrastructure & environment
Signing with Impression
High level embedded architecture
Your People &
Customers
Document
Generation
Document
Workflow &
Approvals
eSignature
and Consent
Agree Module
Secure Integration Gateway
Smart
Document
Completion
EHR Systems
Record
Management
Systems
Service
Bus
Workflow
Systems
Your Internal Systems
Employee
Management
Systems
eSignature Platform
Trust
Onboarding
Digital Identity
Advanced
Managed PKI
Engage
Email
WhatsApp
USSD
In App
Web
Pad/Tablets
Manage
Analytics
Process Analysis
Audit
Servicing
3rd Party APIs
Additional
Modules
Your Infrastructure
Layering security for certainty
Bonus Quiz
How many biometrics can you list?
Write it on your business card and drop it at the stand or scan
the code:
Free 3 year Impression licence at end of survey
Thank You

Contenu connexe

Similaire à Carrie Peter

Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentPerficient, Inc.
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528Arnaud Le Hors
 
Digitise and complete transactions within minutes - DocuSign Digital Transact...
Digitise and complete transactions within minutes - DocuSign Digital Transact...Digitise and complete transactions within minutes - DocuSign Digital Transact...
Digitise and complete transactions within minutes - DocuSign Digital Transact...Singtel myBusiness
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitPablo Junco
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Blockchain explained FIATA Congress 20180910
Blockchain explained FIATA Congress 20180910Blockchain explained FIATA Congress 20180910
Blockchain explained FIATA Congress 20180910Arnaud Le Hors
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBlocktech brew
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Linkedin.Deck
Linkedin.DeckLinkedin.Deck
Linkedin.Deckbepker
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Bloomberg Entity Exchange
Bloomberg Entity ExchangeBloomberg Entity Exchange
Bloomberg Entity ExchangeMarco Mejia
 

Similaire à Carrie Peter (20)

Implementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated EnvironmentImplementing Digital Signatures in an FDA-Regulated Environment
Implementing Digital Signatures in an FDA-Regulated Environment
 
Hyperledger fabric 20180528
Hyperledger fabric 20180528Hyperledger fabric 20180528
Hyperledger fabric 20180528
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digitise and complete transactions within minutes - DocuSign Digital Transact...
Digitise and complete transactions within minutes - DocuSign Digital Transact...Digitise and complete transactions within minutes - DocuSign Digital Transact...
Digitise and complete transactions within minutes - DocuSign Digital Transact...
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
 
Blockchain and Competition – CORBETT – June 2018 OECD discussion
Blockchain and Competition – CORBETT – June 2018 OECD discussionBlockchain and Competition – CORBETT – June 2018 OECD discussion
Blockchain and Competition – CORBETT – June 2018 OECD discussion
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
IT for Escrow & Title Firms
IT for Escrow & Title FirmsIT for Escrow & Title Firms
IT for Escrow & Title Firms
 
Blockchain explained FIATA Congress 20180910
Blockchain explained FIATA Congress 20180910Blockchain explained FIATA Congress 20180910
Blockchain explained FIATA Congress 20180910
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development Services
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Linkedin.Deck
Linkedin.DeckLinkedin.Deck
Linkedin.Deck
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Gift_of_Time_NSW
Gift_of_Time_NSWGift_of_Time_NSW
Gift_of_Time_NSW
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Bloomberg Entity Exchange
Bloomberg Entity ExchangeBloomberg Entity Exchange
Bloomberg Entity Exchange
 

Plus de itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

Plus de itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Carrie Peter

  • 1. eSignatures: Balancing User Experience and Security Compliance at Scale Impression Signatures
  • 2. The cost of getting it wrong Cyber incidents, data breaches and business interruption • The average cyber incident costs an organisation $ 400 000.00 • ENS Africa Hit with Costs (R5.5 mil) for Online Security Hack • Recent GDPR data breach fines and pay-outs: • T-Mobile $350 Million pay-out - Personal data breach • Equifax $700 Million pay-out - Personal data breach • Interserve € 5 Million fine - Insufficient technical and organisational measures to ensure information security • Clearview AI - € 20 Million fine per country - Insufficient fulfilment of data subjects rights • Meta Platforms - € 405 Million fine - Non-compliance with general data processing principles • https://www.enforcementtracker.com/ • Some companies have taken years to recover from data breaches • Recovering from the reputational damage of a public incident
  • 4. Your Opportunities Getting it right from the start to prevent opportunities for fraud, abuse and data security violations
  • 5. Digitizing from the first interaction eSignatures allow processes that are usually paper based to be digitized from the start
  • 6. Customers don’t have to feel the complexity of your need for identity certainty Welcome, to sign this securely we need to verify you! Here’s your agreement, please keep this safe! We need to make sure it’s really you! The information in this agreement is private! Do we have your consent? 1 5 4 3 2 Customers are more likely to grant consent for intrusive biometric verification as part of the onboarding process Digital Identity in 5 steps
  • 7. Maximizing the value of a single interaction eSignatures allow single touch interactions to enable multiple digital processes
  • 8. Prevent fraud before it starts Learn from our Insurance customers experience Certainty of identity & non-repudiable contracting Propensity for fraud, credit checks, sim swap & bank account verification Automation, auditability, AI driven processing & voice lie detection Manual validation, fraud investigation & evidence for prosecution
  • 9. Integrations and platforms Embedded and connected with subject matter experts Microsoft Ecosystem • Word • Excel • Outlook • SharePoint • One Drive • Adobe Process Management • Sybrin Onboarding • AppWorks • Oracle • Salesforce • SAP • XDS • Striata Document Management • Sybrin Nitro • OpenText • OnBase • DocFusion
  • 10. Your Obligations What healthcare service providers need to do to be compliant
  • 11. Credit Relevant Legislation Cases Credit compliance spans several pieces of RSA legislation The National Credit Act describes which particulars need to be included on every credit agreement. Section 2. (3) If a provision of this Act requires a document to be signed or initialled by a party (a) (a) an advanced electronic signature, as defined in the Electronic Communications Act, 2002 (Act No. 25 of 2002); or (b) (b) an electronic signature as defined in the Electronic Communications Act, 2002 (Act No. 25 of 2002), provided that- (a) (i) the electronic signature is applied by each party in the physical presence of the other party or an agent of the party; and (b) (ii) the credit provider must take reasonable measures to prevent the use of the consumer’s electronic signature for any purpose other than the signing or initialling of the particular document that the consumer intended to sign or initial. Advanced Electronic Signatures are defined in the Electronic Communications and Transactions Act, 2002 (Act No. 25 of 2002) as: • An electronic signature which results from a process which has been accredited by the Accreditation Authority. Section 37 and 38 of the Act stipulate the criteria for accreditation: (Section 38.1) - The electronic signature: • is uniquely linked to the signer; • is capable of identifying the signer; • is created under a means that can be maintained under the sole control of the signer; • will be linked to the data or data message to which it relates in such a manner that any subsequent change of data or data message is detectable; *Advanced Electronic Signature is the South African equivalent to QES
  • 12. Consent & Agreement The intersection of privacy and proof of intent • Always keep a record of any consent, agreement or notification • Don’t use consent where you should use a contract • Don’t notify where you should get consent, always notify of data processing activities • Provide a closed loop process where agreements cannot be altered • Track signatory’s interactions with the agreement to prove intent
  • 13. Contracting parties & Identity Compliance and trust require that all parties are identified • Ensure that both or all parties to a contract are identifiable, during and after the signing ceremony for the contract to be valid • Ensure that you know your customer or intended signatory • Ensure that the agreement is only available to the intended signatory • Layer controls to ensure that only the signatory can access and apply their signature
  • 14. Restrict alteration after signing Technical controls must be in place to ensure integrity • Ensure that documents are stored in an immutable format, like PDF • Digitally sign completed documents to prevent tampering • Highlight any attempts at alteration or tampering after signing • Provide technical proof of a document original with singing evidence • Signatory identifying information • Annotations made during signing • Signing workflow or approvals
  • 15. Provide proof of compliance Proof of compliance is required from the sending party • Understand consent and agreement requirements within existing processes and solutions • Create secure consent, agreement and approval processes that do not allow for unintended intervention or alteration • Provide technical proof of the signing process, workflow and signatory interactions • Make technical audit trails easily understood through a Chain of Custody Certificate
  • 16. Securely store records for legislated periods Medical information is deeply sensitive and must be secured • Understand what data must be kept for what period of time • Ensure that communications around this data are sensitive and do not reveal anything that can be used to identify the patient, or prejudice them in any way • Do not store data beyond its useful life or required period • Destroy data that is no longer required • Secure networks, systems and storage appropriately to prevent cyber incidents
  • 17. Presenting a New Standard | Cloud Signature Consortium (CSC) Membership ► How can digital trust services lead the way for digital transformation in your region? And, how can CSC play a role? We hold a valued membership at the Cloud signature consortium where we have seats on the Technical, Advocacy and Marketing Committees. Membership has afforded us the opportunity to participate in the development of a new standard to check conformance with the CSC Conformance Checker, API v2.0. Officially being released to the public XXXXX [Confirm Date] Details can be found here: https://cloudsignatureconsortium.org/join-us/associate-membership/
  • 18. WebTrust Assurance The WebTrust Audit program is based on the following Trust Services Principles and Criteria Security The system is protected against unauthorized access (both physical and logical). Availability The system is available for operation and use as committed or agreed. Processing Integrity System processing is complete, accurate, timely, and authorized. Online Privacy Personal information obtained as a result of e-commerce is collected, used, disclosed, and retained as committed or agreed. Confidentiality Information designated as confidential is protected as committed or agreed. https://cabforum.org/wp-content/uploads/WTBR2_2.pdf
  • 19. WebTrust Assurance Standards and security control framework 3rd Party Annual Audit • KPMG independent audit against global framework • Auditors are granted the right to conduct the audit • Evaluate controls for effectiveness, and then evaluate actual adherence to controls Controls evaluated • Physical & Logical security • Availability & Business continuity • Incident management • System development & practices • Risk management practices • Asset classification & management • Access management & Personnel security Standards • ISO - International Organization for Standardization • ETSI - European Telecommunications Standards Institute • ANSI - American National Standards Institute • CAB Forum – Certificate Authority/Browser Forum
  • 20. Examples Industry insights, use cases and return on investment
  • 21. Agreements are Everywhere Sales ▪ Sales Order Processing ▪ Customer Account Provisioning ▪ Special Deal Terms ▪ Referral Agreements ▪ Partner Agreements ▪ Reseller Agreements ▪ Sales Support ▪ Loan Documents ▪ Support Agreements & Renewals ▪ Commission Forms ▪ Upgrade Application ▪ Downgrade Agreement Marketing ▪ Event Registration ▪ Customer Communication Approvals ▪ Mass Mailing/Email Approval ▪ Event Vendor Agreements ▪ Rebate Agreements ▪ Sponsorship Agreements ▪ Promotion Agreements ▪ Advertising Contracts ▪ Press Release Approvals ▪ Brand Licensing Agreements ▪ Media Plan Sign-off Services ▪ Account Change ▪ Service/Work Orders ▪ Terms Change ▪ Self-Service Requests ▪ Compliance ▪ Field Service ▪ New Policy Applications ▪ Policy Cancellations / Suspensions ▪ Independents Agency Licensing ▪ EFT Authorization Human Resources ▪ Offer Letters ▪ New hire paperwork ▪ Candidate NDA ▪ On/Off-boarding checklist ▪ Employee Policy Distribution & Signature ▪ Contract Agreements ▪ Non-disclosure ▪ PTO Management ▪ Performance Appraisal ▪ Background Checks ▪ Leave Forms ▪ Grievance Forms ▪ Letter of warning Form Finance ▪ Invoice Processing ▪ Expense Processing ▪ Capitalisation Management ▪ Audit Sign-off ▪ Policy Management ▪ Inventory sign-off ▪ Asset Transfer/Retirement ▪ Grant Applications ▪ Sales & Use Tax return ▪ Consumer Account opening ▪ Deposit products IT/Operations ▪ Asset tracking ▪ Change requests ▪ Requirements Sign-off ▪ Access Management ▪ Incident Reporting ▪ Production Change Authorisation ▪ Maintenance Authorisation ▪ Authorisation ▪ Real Estate Approval ▪ Project Budget Approvals ▪ Asset Purchase Form ▪ Software Purchase Form Legal ▪ NDA’s ▪ Contract Management ▪ Internal Compliance ▪ IP Licensing ▪ Patent Applications ▪ Board minutes ▪ Affidavits ▪ Summons ▪ Engagement Letters ▪ Memoranda of Understanding ▪ Change of Ownership ▪ Share Purchase Facilities ▪ Front Desk Sign-in ▪ Work Orders ▪ Lease Agreements ▪ Move In/Out Requests ▪ Parking Permits ▪ Building Maintenance ▪ Construction CAD Drawings ▪ Equipment Load Agreements ▪ Change Justification Forms ▪ Building Permits ▪ Change Orders Product Management ▪ Change Management ▪ Release Management ▪ Code Review Reporting ▪ Requirements Acceptance ▪ Release Scope Commitment ▪ Policy Approval ▪ SDK Agreements ▪ Developer Program Enrolment ▪ Product Development Methods ▪ New Product Evaluation ▪ New Offering Announcement Procurement ▪ Purchase Order ▪ Statement of Work ▪ Master Services Agreement ▪ RFP Sign-Off ▪ Supplier Compliance ▪ Service Level Agreements ▪ Termination Letters ▪ Software Licence Agreements ▪ Rate Cards ▪ Invoice Processing ▪ Subcontractor Agreements ▪ Vendor Contracts
  • 25. Customer opts to take up Insurance
  • 26. Our Platform Accredited, Secure, Embedded & Everywhere you work
  • 27. Return on digitisation A few of the things we’ve seen our customers achieve • Improved process & regulatory compliance • Entire company secretarial functions digitised • Governance, Risk & Compliance function digitised • Time savings through efficiencies • Requirement for printing eliminated • Signed documents returned within hours or days • Operational processes reduced from weeks to hours • Reduced costs • Paper & printing – R3mil a month in a single division of Absa • Cost savings passed to customers • Administration staff redeployed into skilled roles • Rapid implementation • 2 – 3 weeks integrated deployment at many large customers • Instant adoption on internal use • Phased embedding into own infrastructure & environment
  • 29. High level embedded architecture Your People & Customers Document Generation Document Workflow & Approvals eSignature and Consent Agree Module Secure Integration Gateway Smart Document Completion EHR Systems Record Management Systems Service Bus Workflow Systems Your Internal Systems Employee Management Systems eSignature Platform Trust Onboarding Digital Identity Advanced Managed PKI Engage Email WhatsApp USSD In App Web Pad/Tablets Manage Analytics Process Analysis Audit Servicing 3rd Party APIs Additional Modules Your Infrastructure
  • 31. Bonus Quiz How many biometrics can you list? Write it on your business card and drop it at the stand or scan the code: Free 3 year Impression licence at end of survey