Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Friday, 1 March 2013

Why is it important to certify digital data and content?


Digital data/content is central to our daily and business life now, whether it be text, images, audio or video. With the advent of the Internet and mobile computing we are avid creators and users of digital content. As creators we are concerned with ensuring what we create whether it is an email, document or image as examples, remains and are used as we intended and are not misused in any way. As consumers of digital information we want to be able to trust in digital content we receive and use, know its source and that it is accurate and authentic. However we all know how easy it is to copy or change digital content/data either accidentally or maliciously. One of the big advantages of the digital world is that digital content/data is easy to view, copy, manipulate and process. Its strength is also its weakness. So the question is how do we protect the integrity of digital content/data we create? And how do we trust digital data and content we receive and use?

Let us consider some of the reasons we need to consider doing more than we do today:
Why we need to certify Digital Data & Content?
·         Want to be able to prove ownership and copyright of digital content
·         Want to know if content published on web site or issued has  been tampered with
·         Want users of content/data to be able to trust it
·         Want to be able to prove to authorities and management that the information is in compliance with process, standards and regulations
·         Want to be able to use it as irrefutable evidence of  ownership and the authenticity of their original content or data as evidence in a court.
·         People, Organisations and 3rd parties make important decisions based on digital data/content, these decisions can have negative consequences so creating confidence and an audit trail for digital data can create that confidence and history
·         Should there be a question, concern, audit or challenge to the integrity, authenticity and provenance of digital content/data being able to prove beyond doubt these elements will avoid issues and possibly penalties.
How can I quickly and cost effectively create an independently certified record for the provenance, authenticity and integrity of my digital content/data?
Using a service like Digiprove will quickly solve the problem, it is fast to register, use and integrate into your process and software. You can then automatically (Autoprotect), manually or at scheduled time or events ensure some or all of your digital content/data is certified.
A good solution like Digiprove will:
·         Create unique digital fingerprint for each piece of content and/or data using industrial strength encryption algorithms such as SHA-256.
·         Send that fingerprint to the secure independent proof engine in the cloud where it will be date, time and location stamped and combined with your metadata into a digital certificate.
·         All details will be recorded in a traceable and verifiable audit file and the certificate returned to you as well as being stored.
This is in effect your insurance certificate that is fully traceable and can be verified at any time. It is your undisputable evidence that you own the exact content, at a point in time.
That’s all very well, but how do I know the integrity, authenticity and provenance of the digital content/data remains intact and as originally intended and it has not been changed?
There are two key areas that must be considered, and these are covered in the Digiprove technology.
·         Verification of the integrity of digital content/data. You decide how you want to do this, it can be done manually at any time, automatically using “Autoverify” or integrated into your process-application to occur on specific events and/or at specific times with warnings highlighted should there have been a change or tampering. (Positive verification re enforces confidence and trust)
·         Evidence, It’s your digital certificate and the Digiprove record that enable you to prove ownership and integrity beyond all doubt, and in the event there is an incident or case where there has been inappropriate use or tampering you have certainty as to provenance, integrity and authenticity.
 Again using the insurance analysis, your certificates are the evidence you are protected, verification provides the evidence to the assessor of the circumstances that exist at a later point in time, and should there be a legal or regulatory case the authorities can trust.
For more information
Sign-up for a free 1 months trial
Verify content
Join entrepreneurs program and integrate Digiprove (http://protect.digiprove.com/entrepreneur-program )
Protect your Wordpress website or Blog (http://wordpress.org/extend/plugins/digiproveblog/)
 
 


Thursday, 13 September 2012

Irish company Digiprove announces Text & Tweet Protect


Irish company Digiprove announces  Text & Tweet Protect

During the recent Presidential TV debate where information from a Tweet was used live during the debate and it was later admitted the Tweets claim was false, however the damage was done to the leading Independent candidate. Following this incident and several others where high profile individuals were misrepresented and a series of malicious Tweets issued, Digiprove looked to developing a simple, cost effective solution using its patented digital content security technology, which would enable greater trust in who is Tweeting? And what they have Tweeted?

This week they released the first in a planned series of on-line solutions for social media content provenance, integrity and authenticity protection and verification for Twitter.

Twitter offer a verification mark for high profile celebrities and individuals which has comprehensive identity verification and a blue mark is added to these user names on Twitter, however this option is not freely available to the masses.

“What is important is that the reader of a Tweet knows the Tweet is from a credible source, and what was read in the Tweet is actually what the Tweeter sent. The Digiprove text function achieves this allowing the reader of the Tweet check the digital certificate for that Tweet by following a short link inserted into the Tweet, says Digiprove CEO Cian Kinsella”

Digiprove is an Irish technology company who provide solutions for individuals and business  to protect any type of Digital content, securing its provenance, integrity and authenticity and enabling any 3rd party verify these on-line. Users of the patented technology include individuals wishing to protect their copyright to businesses who have integrated the Digiprove process into their own software. The technology has applications in many business arenas including Regulatory compliance, Digital evidence & eDiscovery, creating trust in digital content and creating tamper evidence. Anywhere Digital information is used to make important decisions or take action either by an individual or an organisation this technology secures trust in the digital content used.

For more information visit.




 

 

 

Tuesday, 4 September 2012

Digital Transaction & Process integrity (Creating certification & user confidence)


Digital Transaction & Process integrity (Creating certification & user confidence)

Personal & Business people carry out many of their daily functions on-line in this digital age, but how do suppliers of on-line information and services create greater confidence in the user so they can grow their business, create deeper engagement and increase the user confidence to carry out more critical transactions with your on-line service?  The answer is about creating more trust.

In the on-line world, how do we create this trust? The answer lies in ensuring there is a chain of authentic evidence in the process that delivers your service, and that the user of the service can independently verify this chain of evidence with an independent specialist in digital content assurance. OK so what does that mean for the user? On-line users of services are very familiar with the standard security processes and brands, e.g. passwords, user authentication emails, SSL, Norton, Secure payment systems such as Visa, Realex, etc. All these components go to building trust for the user. In addition some service providers go the extra mile and use more complex and expensive certified keys and encryption, though this often comes with an over-head for the user.

How can we improve that user trust & confidence?

There are three key areas that need to be addressed in a simple and cost effective manner:

1.       Source Identity Integrity & Authenticity

a.       Is this person, company or entity, who they represent themselves to be?

2.       Content Provenance & Integrity

a.       Is the content (Digital) the original, un-tampered and as issued?

3.       Verification of Identity & Integrity

a.       Can I confirm with one click 1 & 2 above?

For the supplier of on-line services & information whether they be process based or transaction based, the question is how can I build these characteristics into my software in a simple and cost effective manner?

For the User when using the on-line service, is it obvious and intuitive that any information and service I use on this web-site I can trust, and if I have a concern can I independently verify the provenance, Integrity & Authenticity with one click of the mouse?

How to build in trust and certification to your software?

Digiprove’s patented and certified technology is a unique way to quickly and cost effectively build in a traceable, certified and verifiable set of functionality. By use of one of the Digiprove products or quickly embedding the process using our software developers kit (SDK).

What can be achieved by embedding Digiprove in your solution?

The most important outcome is your on-line service and information is differentiated because it has independently verifiable credentials, enabled by Digiprove.

·         End user customers and embedded partners have independent verification of their identity and can use the ID-V logo on their digital certificates.

·         Each piece of digital content (Text, Image, Audio, Video, Data), can at any stage in the process be quickly certified by the Digiprove “Proof Engine” as an automated task. This creates an audit trail and independently verifiable certificate with the digital fingerprint, date, time and location which is undisputable evidence and proof of authenticity.

·         The ability for a user or receiver of the content to either on or off-line verify the provenance, integrity and authenticity of the digital content as well as the credentials of the originator.

The bottom line is by deploying Digiprove technology any Digital Asset which has a value whether financial, reputational, brand or compliance can have that value protected.

Protecting On-Line Reputation


On-Line Reputation Management

Whether you are a business, not-for profit organisation, band, or individual your reputation and brand is important to you. We often differentiate between the on-line and off-line brand and reputation but for most they are closely connected all bit it there may be some slightly different emphasis on-line.  The one common thing is that in the world of today, which is a digital world is that our reputation can be damaged in milliseconds either accidentally or maliciously. Digital technology brings huge benefits in the flexibility to create, change and mass communicate content and information, but this benefit comes with risks that have to be managed.

So what are the risks?

There are two main digital risks that expose your reputation:-

1.       Identity Fraud or Theft

2.       Message tampering

Identity Fraud relates to known or unknown persons or entities misrepresenting themselves as someone else, or some other entity (Band, Association, Company, Organisation). Having adopted a false identity they then communicate misinformation that, as a minimum may be misleading and disruptive and, at worst be libellous and cause serious if not fatal damage to a reputation. Regardless of the extent of the misrepresentation there is a cost to those that are misrepresented and many other related stakeholders.

Message Tampering is the situation where what is communicated and interpreted by the reader has been changed either accidentally or maliciously. The ability even for the amateur hacker to change digital content is strong, given the nature of digital content, and the professional hacker can make changes and leave no record or evidence.

The bottom line is it’s relatively easy to adopt a false identity and to change digital data, text and tweets as examples.

How can I protect my on-line reputation?

Identity Fraud

There are many solutions, Twitter for example provide an identity verification and mark for high profile individuals, however they choose who will get the benefit of this process and, it is only offered to a relatively small number of famous people/entities.

Digiprove have enabled their technology process in order that anyone can add a significant layer of protection to their identity. By becoming a paid user of Digiprove’s on-line digital content protection service your Identity will be verified using your credit card details and so long as you have a credit card in the same name as your account registration. Once you have Digiproved your content or issued a tweet from Digiprove we associate  your content/ tweet with your identity. Readers of your content/tweets will be able to quickly verify you have an identity verified mark on www.digiprove.com at the click of the mouse.

Content & Tweet Tampering

In addition to ensuring your personal identity remains authentic, you are also concerned that your content/tweet is received un- tampered and the reader sees it exactly as you intended. By using the Digiprove functionality all your content/messages will be certified. This means there is a digital certificate created, which includes the unique digital fingerprint of your message, the date, time and your identity at the time you create your message. Any readers of your content whether it be documents, images, web pages etc. can verify the integrity on-line and view the certificate.

Digiprove inserts a short link into your tweet that all readers can see. By clicking on that link any reader can view the certificate details and also they can cut and paste the text should they wish and have the Digiprove proof engine confirm its integrity and authenticity, any tampering will be evident.

 

 

Monday, 30 July 2012

Selecting a cost effective, compliant Document & File management solution for financial advisors, agents and brokers ?


Selecting a cost effective, compliant Document & File management solution for financial advisors, agents and brokers ?

As I meet with financial specialist clients, whether a one person operation or a large professional practice, a common theme has emerged about the time wasted handling, processing & searching for documents. Both the professionals and the back office team lose productive time with these non-productive activities. We have quantified and costed these activities as an additional 15%-20% on  your operational costs.
Searching to find the correct documents one of the team needs, which may be related to a client query or a need to reference  during a client meeting out of the office, or perhaps to confirm compliance or provide a supplier with some important policy or client information, is a well understood example the industry can relate to.

Documentation is very important for your business, for your client and for 3rd parties such as regulators and therefore is central to your business success. So what is needed is a software solution that ensures for both professionals and back office staff that Information and documents are correctly available when required, and the time spent on the actual content of the document as it relates to the stakeholder is where your focus is, and that any handling or storage is automated in a secure manner.

The challenge is often the same in a practice which uses software as well as those who are still largely paper based. Analysis suggests the problems are fundamentally the same.

·         One back office person handles all processing and filing, and is the focal point for requests for information and documentation, that person can be a bottleneck in the process, always has to do the storage and retrieval and may have a system not understood by the rest of the professionals in the practice.

·         Two or more back office staff handle the processing and both though competent do things slightly differently.

·         It’s a “free for all” and everyone in the practice has access for storage and retrieval and things go missing, get misfiled and sometimes lost.
We all understand the challenge when a business is paper intensive and regulated. What is surprising for some is that having moved part or all of their process to the digital world that the expected benefits for doing this are not realised.

There are three digital scenarios that are most common within the financial specialist community, and only one of these scenarios can be considered effective in delivering real business benefits and bottom line results. Let us consider each scenario:-

1.       Electronic Filing on our Server/PC’s: This is probably the most common scenario where some or all of the team create, update, scan and store documents using the operating systems file management tools, such as Microsoft Windows or MAC OS. Though there can be some benefit in flexibility to change and update documents, all of the above issues that were experienced in the paper world, just transfer to the digital world. Even if we just focus on back office person managing the records, they have to create the files and folders, come up with naming conventions, take decisions daily what folder and file to store a document in and the Filing system may not be readily accessible to everyone, or worse still everyone does their own thing.

2.       Document & File/Record Management Systems: There are many systems available from the sophisticated, expensive enterprise systems to low cost or even free open source document management systems. These are not inherently bad systems and when set up and operated correctly they provide great quality and productivity gains. However because they are generic in that they have application in many types of businesses they have to be configured, have work flows set up, choices have to be made on types and handling of different document types. Search features will tend to be mainly key word so there is still a fair amount of wading through search results to find the right document.

3.       Document & File Management for Specialists:- We believe based on our experience that the best results and biggest payback, for financial specialists who want to move to, or derive the full benefits of the digital world and go totally paperless, is to use a system such as Brokerprove which is designed specifically for advisors, agents & brokers. It has a completely pre-configured file structure and document types that are unique to your business. It handles the structure and naming of files electronically and as a result, it’s harder to make mistakes, because the filing process and system is very well defined, there is only one process and one filing system that everyone uses. Searching for documents is more refined and faster and can be completed by any of the team once they have an internet connection. Nothing can get lost even if there is an unplanned system outage as a copy of every file and folder is securely stored in the cloud.

In conclusion:- If we had a totally paper based business with all the legacy issues and costs that exist and we were to fix this system, what would we have to do.

·         Define in great detail the process for receiving, handling and storing any type of document we need in the business.

·         Document the process and system and then train and retrain every staff member.

·         Have strict , enforced rules for checking in and out documents

·         Always anticipate the specific documents needed during the day so that you have them with you when you need them and have a process to let everyone know what documents you have.

·         Monitor and audit the process very regularly to ensure compliance, keep a record of non-compliances and corrective actions.

However what we are suggesting that when you move to the Digital world that all the above items are addressed automatically, pragmatically and in a way that is user friendly, this is why we recommend using a document and file management system that was designed specifically for your financial advisory business. The system provides the guides, standards, process and rules for how digital documents are managed, so it’s just becomes the way everyone does things giving more consistence, higher productivity, better stakeholder services and enhanced compliance.

Procurement check-list for a Document & Record Management System:

·         A file structure specific to a financial specialists business

·         An automatic file naming system that is easy to understand and manually or automatically search.

·         A utility to quickly determine your record compliance status

·         An un-disputable set of (e) evidence that can be independently verified by any stakeholder on or off line as to the provenance, security and integrity of any document.

·         A level of digital security that ensures only authorised personnel can access and review specific documents.

·         Simple secure access for any authorised individual via the internet anywhere, any time

·         Confidence that there is always a secure, up-to-date back up copy of all files available.

Only Brokerprove meets all these criteria by design.

For further information








Thursday, 15 March 2012

Top 10 Pitfalls in Protecting Digital Content: The Reasons for Failure

Introduction

The need to prove the provenance, integrity and authenticity of an electronic document has become an area of increasing interest over the last few years. This includes the ability to prove times and dates of the creation and any modification of the documents. But is all this really necessary? Do businesses need to have this sort of functionality in place? Until recently, electronic records were treated much like their paper counterparts, at least in terms of their admissibility as evidence in a court of law. But this seems to be changing and quickly. In several landmark rulings, electronic business records that earlier would have been routinely admitted into evidence have been excluded because of questions as to their authenticity.
The December 2006 amendments to the Federal Rules of Civil Procedure have caused corporate IT departments to spend huge sums building systems to respond to eDiscovery requests. But if the authenticity of the documents so produced is challenged, that might be money down the drain. As a result, authenticity challenges around electronic records are emerging as a serious problem for attorneys. They can also represent an opportunity, once counsel begins to understand the new litigation tactics that can be used to win cases or drive settlements.

There are a few key areas in which a solution that performs these key authenticity functions is useful. They are:
·         Compliance
·         Copyright
·         Intellectual property protection
·         Protection of your legal position
Even from this short list it appears that there are an abundance of reasons as to why you should invest in a solution which reduces the burden of compliance, and which acts as a proof of ownership and copyright.  But what is the flipside? Are there any reasons not to introduce a solution for this purpose?

We’ve compiled a list of 10 reasons why you shouldn’t digitally fingerprint and protect your documents:

You don’t foresee an event where you will have to prove a document’s integrity.


And why would you? Nobody ever expects things like this to happen to them.
However, you may just be looking at this from the wrong perspective. For example, ask yourself this question: “Why have I got motor insurance?” Most people think that they will never have a car crash.  So why do they insure their cars? Ok we hear you, it’s the law and it could cost you a fortune not to have it in place. Proving a document’s integrity is similar however. You don’t realise you have to have a solution in place until it’s too late. Should a situation arise (e.g. a court case) where you must prove the authenticity and integrity of a particular document having a solution in place could save your organisation a fortune in legal fees, fines and compensation payments for example.

You like going to court.

Everybody likes a day off work and a trip to a courtroom can be quite fun on occasion. Whether you’re the plaintiff or the defendant, your day out of the office will be far less enjoyable if you don’t have the ability to prove the integrity of a document which is being used as evidence. If this document is the smoking gun your case is built on, you’re in serious trouble as it will probably be thrown out of court. Whether or not spoliation has occurred it is your ability to prove the document’s integrity that matters. The risk to you personally as an employee can be quite high especially if this is a document which should have been protected by you or your department (e.g. an employment contract if you are a HR manager, financial reports if you are a CFO). Not only could this potentially cost your organisation millions you are probably going to lose your job. On the bright side, a few more days off work.  But if this is not what you want, you have to ask yourself, “Have I covered all the bases?”

You enjoy falling foul of compliance regulations

It’s almost as good as being a teenager rebelling against your parents again. The only issue is that it’s a little more risky. Failing to comply with regulations such as Sarbanes-Oxley (SOX) or the Federal Rules of Civil Procedure (FRCP) can land a company in hot water leading to penalties including fines and jail time depending on the situation. There are so many different compliance regulations, across virtually every industry, that it has become extremely difficult to make sure you are compliant with them all. By being able to prove the integrity and authenticity of a document you are ensuring you are able to prove your compliance around many regulations concerned with spoliation, falsification of documents, ownership and much more.

You like to risk major financial penalties

“Our company is doing well we can afford legal fees, a few fines and compensation payments.” And maybe you can. But wouldn’t it be better to avoid the situation altogether and invest a comparatively small amount in protecting your legal position with the ability to prove the authenticity of your documents.

You don’t have the cash flow.

Ok fair enough. In the current economic climate businesses need to make savings wherever possible. But you really have to think long and hard about what you can afford not to have and what is essential. Think about our last point. Can you afford a financial penalty down the road from not being able to prove the authenticity and integrity of your document? It’s unlikely, cash is the life blood of business, without it your business could go under and even if it doesn’t your cash flow will not be in a healthy position.

You are not worried who tampers with your digital content

Do you even have a reason to worry? You probably don’t think you do. The problem with digital documents is the ease which they can be changed and the fact that these changes are often undetectable. There’s little that you can do to stop a document being altered once somebody else is in control of it. However, if you know it has been changed, as well as what has been changed and when it has been changed, it can allow you to take the appropriate action to rectify the situation. The only way to do this is introduce a solution which digitally fingerprints, time stamps, verifies and authenticates the document’s integrity highlighting when a change has occurred to your document. Whether it’s your web site content, your blog, your images or critical data your organisation and 3rd parties like customers or regulators make decisions on you want to know its valid content.

You like other people taking credit for your work

Some people are just modest in nature. If you produce any piece of work such as website content, reports, articles, music and photos to name but a few, the last thing you want is another person to pass it off as their own original work.  You can’t stop this happening but with digital fingerprint technology you can make sure you can prove ownership and copyright of your work and get the credit and financial rewards you are entitled to or simply prevent the person or organisation for using your work without permission.

You don’t want to make financial gains from your intellectual property

There could be many people in the world like you who just are not interested in making money. But if you are sitting on a gold mine and really want to make the most of your idea or invention you need to be able to prove the copyright of your intellectual property. Although you own the copyright as soon as the idea is recorded if you cannot prove when and in what form the idea was recorded, you are leaving yourself open to the risk of somebody stealing it and using it themselves. Ever heard of Antonio Meucci? Most people haven’t. He is the man who invented the telephone. However, he was unable to pay the patent caveat for the telephone (it was $10 at the time) and a worker in the patent office decided that this telephone wasn’t such a bad idea. Of course we all know who is credited with being the “inventor” of the telephone, Alexander Graham Bell. For years, the two fought out legal battles (including some on their behalf posthumously) about who had invented the telephone, a situation that could have been avoided had the technology of digitally fingerprinting documents been around back in them days. Had this been the case Antonio Meucci and Alexander Graham Bell would have been able to comprehensively prove who had invented the telephone first.

You are not worried whether others trust you or your content

Maybe your digital content has no value in your eyes and is not intended to inform, advise, protect or cause action. But if it is, then you want the users of the content to be confident in and trust the integrity of you digital content. As digital content is so easily manipulated, often in an undetectable way, you also need to have confidence in the content you produce, knowing that you can reliably prove its provenance, authenticity and integrity.

You don’t rate your competition

If you are an SDK developer you want to have every possible advantage over your competitors. If your product is in a sphere where being able to prove the integrity, authenticity and provenance could be important, adding a function that digitally fingerprints your electronic documents could give you the competitive advantage you need. However, if you don’t rate your competitors you probably don’t have to worry, unless of course they add the function to their SDK.

Cases

Amex v. Vinhnee, December 2005

In this case, American Express claimed that Mr.Vinhnee had not paid his credit card bills, and took legal action in order to recuperate the money. However, the judge decided that American Express had failed to authenticate the electronic records being used as evidence, and that therefore Amex’s business records were inadmissible as evidence.
American Express tried to have the records admitted as evidence a second time and they were yet again told the records were inadmissible on the grounds that they failed to sufficiently establish a foundation of authenticity for the records offered into evidence. Finally, American Express appealed this judgement and lost a third time. Interestingly, the defendant didn’t show up for the court date, and wasn’t even represented by counsel.
This decision is considered significant because it said, in effect, that electronic records are not automatically presumed to be admissible (in court) unless you can prove that the electronic document submitted is identical to the original record. The decision also meant that courts and counsel would require parties submitting digital documents as evidence to show some way of testing and proving the authenticity of those electronic documents.
In this case, the judges made it clear that the digital records presented by Amex were “too vague” to be admissible as evidence, in essence, asking the court to accept so-called “inferred authenticity” which was judged to be insufficient.
The judge pointed out that, “... the focus is not on the circumstances of the creation of the record, but rather on the circumstances of the preservation of the record … so as to assure that the document being proffered is the same as the document that originally was created…. Ultimately, however, it all boils down to the same question of assurance that the record is what it purports to be.”

Lorraine v. Markel, May 2007

In this case, a couple took their insurance company to court in a dispute over the cause and amount of damage to their yacht which had been struck by lightning. Both parties petitioned the court for summary judgment, and Judge Paul Grimm dismissed both of these motions, because the digital documents at the center of the case could not be authenticate and therefore were inadmissible as evidence.
In his opinion, Judge Grimm wrote, “The primary authenticity issue in the context of business records is on what has, or may have, happened to the record in the interval between when it was placed in the files and the time of trial. In other words, the record being proffered must be shown to continue to be an accurate representation of the record that originally was created.”
There has been a major rise in the amount of federal judges that are concerned that electronic documents have been manipulated or altered before being produced for use in litigation or that the programs and procedures used to create and maintain these digital documents cannot be relied upon to protect these documents from manipulation by corporate insiders.
This ruling makes it clear that while some courts will continue to view electronic business records much as paper documents (which are rarely challenged on grounds of authenticity), attorneys should be prepared to face more frequent challenges to e-records in the coming years. Judge Grimm wrote, “Unless counsel knows what level of scrutiny will be required, it would be prudent to analyze electronic business records that are essential to his or her case by the most demanding standard. The cases further suggest that during pre-trial discovery counsel should determine whether opposing counsel will object to admissibility of critical documents.”
“The logical questions extend beyond the identification of the particular computer equipment and programs used,” the judge wrote. “The entity’s policies and procedures for the use of the equipment, database, and programs are important… how changes in the database are logged or recorded, as well as the structure and implementation of backup systems and audit procedures for assuring the continuing integrity of the database, are pertinent to the question of whether records have been changed since their creation.”
He concluded, “Further, although ‘it may be better to be lucky than good,’ as the saying goes, counsel would be wise not to test their luck unnecessarily. If it is critical to the success of your case to admit into evidence computer stored records, it would be prudent to plan to authenticate the record by the most rigorous standard that may be applied.”

About Digiprove

How it works?
Digiprove is a service that supplies independent time-stamped proof of digital content (without the need to send or store the content with us thus maintaining full confidentiality). Think of it as a Digital Notary. It automatically takes the digital fingerprint of all content submitted to it and provides certification of its existence.
It does this by encoding and time-stamping the relevant digital content and issuing a digitally signed certificate referencing this content. The service is based on a patented process and the proof is indisputable.
Auto-Protect uses the proven core technology of Digiprove and is designed to be deployed within organisations as a background process that just runs automatically without manual intervention. All you need to do is record your digital data according to the folder structure you have chosen (you are probably already doing this).
Note that although the Digiprove service itself is SaaS (Software as a Service), it co-exists with your existing office automation and business software and hardware – you do not have to discard your existing investment in software and hardware in fact you can point autoprotect to your current application data and it will also be automatically protected
The beauty about the way this has been set up is that there is the absolute minimum amount of dependence on you or your staff to run backups or do housekeeping tasks. The main task that requires manual intervention is the process of indexing all newly created or amended documents (incoming and outgoing). To make all this work, you will need to adopt a standardised folder structure and file naming conventions.
Independent Expert Opinion
The Digiprove service has been independently examined and tested by Georgia Tech who are one of the foremost world experts in digital security, and they had this to say:
“… the process described in the patent does indeed provide a tamper-proof way to show that digital data has not changed since its timestamp. The process also provides a provision to validate any alteration made after it has been time stamped… the software does faithfully implement the patented 'Digiprove' process providing an authenticated method for establishing proof of existence and possession of digital content of any kind.”
For more information
Email info@digiprove.com

Monday, 5 March 2012

Embed Trust, Compliance & Protection in Software & Data

Introduction

Your software whether COTS or Bespoke brings to your client’s or your own organisation the benefits of automation and the flexibility of digital processes & content, these benefits are indirect when you consider the primary drivers are likely to be Improve Financial Performance, Customer or Citizen Service, or carry out tasks that would not be practical to carry out manually.

Software Applications or Information systems are central to the creation and flow of Information in every aspect of business life today, they support every function in the organisation and decision making at every level from the front line or shop floor up to the board room and for external parties.

Your business/organisation is providing these software products and IT solutions to your client’s/end user’s and they are central to their business processes, legal and regulatory compliance. So why is there so much emphasis on printing and signed paper records? The answer is “Trust”. Digital data & content can be easily manipulated accidentally or maliciously even with what would be perceived as good IT security. A professional malicious hacker can circumnavigate most standard security and the use of elaborate security solutions can be very costly and make usability an issue.

How do you bring trust to the digital content your application creates, handles or uses, in a simple cost effective manner? If your software ticks all the boxes below, then you have a compelling proposition, if you don’t tick all the boxes then don’t worry by doing a quick free integration of Digiprove technology or alternatively installing Autoprotect from Digiprove you can secure the trust of any user or 3rd party in the information your solution provides:

þ Provenance of any digital content can be established (Origin)
þ Digital content can be verified as it is used or at any time on and off line (Tamper evidence)
þ Tamperproof & Auditable logs of content history (Life cycle events)
þ Content does not leave its operating environment (Remains Confidential)
þ Meets Legal and evidential requirements for eDiscovery, Spoilation identification and preservation.
þ Meets business and regulatory requirements for digital signatures, digital records, and Integrity.
þ Creates unique digital fingerprint and certification for any type of digital content.

What Value will the integration of Digiprove into our solution bring?

·         It enables your software solution stand out from the competition by ticking all the boxes above.
·         It enables trust and confidence for all stakeholders in the digital content integrity, its provenance is assured and any tampering identified.
·         It secures the evidential value of digital content for business decisions and for any 3rd party investigation (which may include eDiscovery)
·         It will enable compliance with 3rd Party requirements, such as regulators, government & auditors.
·         It will allow you operate without any paper in your process
·         It will differentiate your software solution.

How does Digiprove achieve this? And what is Digiprove’s evidence?

Digiprove is a unique patented technology process that without the need to transmit your digital content to Digiprove, creates a unique digital fingerprint of your digital file(s), it securely registers the fingerprint with the metadata such as owner, Date, Time, Location and creates an audit trail so that should the digital content be altered in anyway it will be evident on verification. Verification can be completed on or off line or can be fully automated using a component from the Digiprove Software Developers Kit.

Our evidence is that we already have over 5000 users and specifically using our SDK it has been integrated into software/solutions with applications in compliance such as Financial Services, Human Resource Management, Financial and legal. In addition The Georgia Technology Institute, the world’s leading authority on Digital Security has tested and verified Digiprove’s technology and here is what they say:

“… the process described in the patent does indeed provide a tamper-proof way to show that digital data has not changed since its timestamp. The process also provides a provision to validate any alteration made after it has been time stamped… the software does faithfully implement the patented 'Digiprove' process providing an authenticated method for establishing proof of existence and possession of digital content of any kind.”