Document/Content management- Security
Assets managed within the EZContentManager environment are secured using a comprehensive approach to standards-based security.
Users are authenticated with encrypted passwords to gain access to the system.
SSL Encryption can be achieved using your organization’s Website Certificate. This level of security ensures secure delivery of necessary communication between EZContentManager components and the user’s browser.
EZContentManager may be further configured to support individually assigned certificates, enabling users to digitally sign documents as part of a defined workflow process, providing non-repudiation of origin. Audit logs record every interaction with managed files and can further provide non-repudiation of receipt, proactively addressing growing compliance and regulatory issues.
An inherited rights security scheme may be employed by administrators to control various levels of access to folders and document types. Security controls may be assigned per user or to a group of users.
Audit logs are employed to track the evolution of documents, as well as ensure the integrity of the content managed within the EZContentManager environment. These audit logs are vital when demonstrating regulatory compliance or participating in some types of litigation.
Delegated Management Roles:
Day-to-day repository administration can be delegated to users that are concerned with routine growth and use of the information managed within the system, while other more advanced management functions can be retained by technical staff.