Newsletter | March 14, 2017

03.14.17 -- Scan And Capture Technology Is Not Immune To Data Breaches

Featured Articles
One-Touch Document Capture Platform Improves Timeliness, Accuracy Of Management Reports
By OPEX Corporation

Sun Life was manually processing over 25,000 medical and dental health claims daily. In addition to reporting and tracking inaccuracies, the length of time to process a claim could be as long as seven days. Sun Life undertook an imaging and workfow project to improve cycle times and control and the biggest hurdle was the complexity of over 800 different sizes and types of medical claim documents.

How Intelligent Automation Is Eliminating Manual Data Entry
By A2iA Corporation

Technological automation doesn't need to be perfect, it just needs to be better than the humans it is replacing. And, it turns out, that's a benchmark being met and exceeded in more areas than one could have previously imagined.

Scan And Capture Technology Is Not Immune To Data Breaches
A Q&A with Joseph Pizzitola, ibml

Headlines about security breaches are commonplace. A company is hacked by someone and exposes sensitive information. Other times an employee accidentally leaves a laptop or thumb drive out in public. Regardless of the circumstance, companies that use scan and capture technology must be aware of how liable they are for data breach issues and must implement security features to protect their data.

Featured Product
Ultra-High-Volume Scanner: ibml ImageTrac 6400 Class Ultra-High-Volume Document Scanner

Regarded as ibml's most versatile scanners, the ImageTrac 6400 class scanners provide unique transaction processing benefits for users in a wide range of vertical markets.

Download Datasheet
Request Information
Connect With ECM Connection:
LinkedIn       Twitter