SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
No Hiding
in the Cloud:
THE TELLTALE   As organizations increasingly adopt cloud        transforming traditional business pro-
SIGNATURE OF   technology, the chief information secu-          cesses. In CIO magazine’s “2012 State of
INEFFICIENT,   rity officer (CISO) role is taking on greater    the CIO” survey, the cloud was the factor
               prominence as broker across corporate divi-      cited most often as influencing the role of
NONSECURE
               sions in order to ensure proper due diligence    the CIO in the next three to five years.
PROCESSES      is performed and strong data protections
               are in effect. As a result, many are turning a
               critical eye on one particular business pro-     ✔ SECURE BUSINESS ASSETS
               cess that continues to defy auditing, lacks      IN THE CLOUD
               anti-tampering controls and eschews digital
               authentication and authorization: the paper-     The cloud equation is indeed a strong one.
               based, “wet-ink” signature.                      Today, ROI discussions are often centered
                                                                around what can be more cost-effectively
               There’s little doubt that cloud technology,      deployed, transitioning previously auto-
               or IT delivered as a service, is dramatically    mated functions “into the cloud” to take
2
                                     No Hiding
                                     in the Cloud



“With the                          advantage of the cost benefits, flexibility     compliance requirements to protect sensi-
 increasing                         and scalability derived from software-          tive data and intellectual property.
 demand and                         as-a-service (SaaS), infrastructure-as-a-
 expansion of                       service (IaaS) and platform-as-a-service        The forces transforming the delivery of
                                    (PaaS)—utilizing technology as a utility.       information technology via cloud and to
 the global role
                                                                                    an increasingly diverse array of mobile
 of security,
                                    According to a report earlier this year sur-    devices are also transforming the role of
 the role of a                      veying 554 IT professionals, six out of 10      the CISO. As Forrester analyst Andrew
 modern CISO                        U.S. companies already have at least one        Rose noted in a recent blog, “Security
 is evolving                        application in the cloud, and 71 percent        management now encompasses much
 from simply                        expect to increase spending on cloud ser-       more than technology; CISOs can build
 being a tech-                      vices in the next 12 months.i In addition       their reputation and enhance their per-
 nical officer                      to business continuity, the top business        sonal career prospects by talking ‘ROI’
 to a leader                        drivers for moving to cloud services are        rather than ‘IPS’ and influencing their
                                    increasing speed of deployment, gaining         colleagues at the highest levels of the
 in business
                                    the flexibility to react to market condi-       organization.”ii
 strategy.”
                                    tions, and improving customer support.
                                                                                    IDC senior market analyst Naveen Hegde,
                                    Yet that same survey indicates significant      reviewing results of an IBM survey of
                                    concerns that putting data in the cloud         CISOs, came to a similar conclusion:
                                    also carries risks, with 70 percent of the      “With the increasing demand and expan-
                                    respondents citing security worries as the      sion of the global role of security, the role
                                    top barrier to their adoption of cloud com-     of a modern CISO is evolving from simply
                                    puting. Whether implementing services           being a technical officer to a leader in
                                    via public cloud, private cloud or a hybrid     business strategy.”iii
                                    of both, organizations are relying on
                                    some form of shared access beyond the           One of the key factors in this transfor-
                                    walls of the data center, often intending       mation of the CISO role is the grow-
                                    to increase availability of those resources     ing requirement for sharing information
                                    to mobile users within or outside of the        securely outside of the walls of the enter-
                                    organization.                                   prise. According to PriceWaterhouseCoo-
                                                                                    pers, “Once seen only as the first step in
                                    Already concerned about compliance and          asset protection, today’s security plays
                                    security for more traditional IT resources,     a critical role in enabling the exchange
                                    CIOs, CISOs and CEOs now have to worry          of sensitive information with other
                                    about managing risk and building trust          organizations.”iv
                                    within a new computing paradigm that is
 i Lauren Brousell, “CIOs Plan      evolving rapidly and along different lines
 to Increase Cloud Spending,”
 March 28, 2012. CIO magazine.      of deployment. Of paramount importance          ✔ PAPER, PEN AND INK: THE WEAK
 ii Andrew Rose, “Go Beyond         to these executives advocating a cloud-         LINK IN THE SECURITY CHAIN
 Technology To Build An Effective
 Security Practice,”                based approach is the determination that
 July 24, 2012. Forrester
 Research.
                                    the cloud provider offers the same—if not       One of the most persistent forms of
                                    greater—level of information security as        exchanging information with other orga-
 iii Naveen Hegde, “IBM Study:
 Changing Role of CISO, from        the organization itself. Beyond business        nizations is the written signature. Used
 Technical Officers to Business
 Strategy Leaders,”                 efficiency qualifications, the very nature of   for myriad purposes, from legally binding
 July 2, 2012. IDC Insights.
                                    a CISO’s responsibilities is to ensure any      contracts to proposals to finance applica-
 iv “How to align security with
 your strategic business objec-
                                    selective adoption of cloud service pro-        tions and so on, the “wet-ink” signature
 tives,” 2005,                      viders meets stringent due diligence and        is a fundamental business process that
 PriceWaterhouseCoopers LLC.
3
                                  No Hiding
                                  in the Cloud



“ ocuSign’s
 D                               many organizations are still struggling to     transmission of paper documents lacks
 eSignature                      automate.                                      basic security protections that are rou-
 services not                                                                   tinely applied to electronic data, such as
                                 Considering the time involved, and the         encryption and authentication. So, why
 only allow
                                 effort and cost of printing, faxing, scan-     has paper-based signing persisted when
 for secure                      ning and overnighting documents of all         nearly every business process leading
 business                        types for signature—not to mention the         up to and following the signature has
 transactions                    labor-intensive processes of keying and        changed?
 to be com-                      rekeying data—it is remarkable how many
 pleted from                     of today’s highly automated businesses         “Signatures remain small, but important,
 almost                          still remain tied to eminently manual          components of myriad business transac-
 anywhere,                       methods. Many make significant invest-         tions,” Gartner Inc. analyst Gregg Kreiz-
 they make our                   ments in sales and marketing automa-           man wrote in a 2012 report.v “Signature
                                 tion to accelerate the acquisition of new      requirements can be found in internal and
 sales process
                                 customers and revenue, only to leave the       external interactions, but are most sought
 more efficient,
                                 most crucial part of the process—actually      as formal components in transactions
 customer-                       gaining a binding customer agreement—          among parties in different organizations.”
 centric as well                 completely manual, time-consuming and
 as credible.”                   labor-intensive.                               While other business processes suc-
                                                                                cumbed to automation, adoption of
                                 What is more striking, however, is that        electronic signatures, or e-signing, lagged
                                 “wet-ink” signatures and paper-based           behind, for many reasons. Initially, there
                                 documents are inherently unsecure. For         were legal issues regarding acceptance of
                                 the most part, both can be duplicated,         digital signatures on filings and contracts,
                                 used by unauthorized parties, and even         but the European Community in 1999 and
                                 stolen without anyone realizing it.            the United States in 2000 adopted legisla-
                                                                                tion to ensure legal validity of electronic
                                 Marci McCarthy, president and CEO of           signatures and electronic documents.
                                 T.E.N. and creator of the Information
                                 Security Executive® Programs recognizing       Also, before the Web and cloud, organiza-
                                 the contributions of security profession-      tions were only able to take advantage of
                                 als within organizations, is a proponent of    on-premise server-based systems, which
                                 adopting electronic signature for business     were complex and lacked standards for
                                 efficiencies and transaction management        certification, limiting their appeal at many
                                 within a secure platform service. “Docu-       organizations that were already struggling
                                 Sign’s eSignature services not only allow      to maintain disparate systems and facing
                                 for secure business transactions to be         interoperability issues with partners and
                                 completed from almost anywhere, they           customers.
                                 make our sales process more efficient,
                                 customer-centric as well as credible,”
                                 McCarthy says. “Furthermore, this type of      ✔ E-SIGNING COMES OF AGE
                                 product provides T.E.N. and our custom-
                                 ers with a virtual repository that is acces-   Consumer-facing businesses such as lend-
                                 sible, auditable and accountable.”             ing and insurance have adapted quickly
                                                                                to customers who are increasingly com-
                                 An organization’s most valuable asset          fortable with and often expect to be able
v Gregg Kreizman, “The
Electronic Signature Market Is
                                 outside of its employees is the intellectual   to transact all activity electronically from
Poised to Take Off,” May 21,     property around the data it transacts, yet     their desktops, laptops, mobile phones
2012. Gartner Inc
4
                                 No Hiding
                                 in the Cloud



As companies                    and tablets. That has dramatically trans-     16 examined and tested, PCI DSS 2.0
look for inno-                  formed acceptance, adoption and use of        compliant as both a merchant and level-
vative ways                     e-signing.                                    one service provider, TRUSTe certified
                                                                              and a member of the U.S. Department of
to increase
                                Organizations reliant on customer rela-       Commerce Safe Harbor.
speed to
                                tionship management (CRM) or sales
results,                        force automation (SFA) systems have
reduce costs                    come to recognize that e-signing can          ✔ WHY E-SIGNING IS A BETTER
and enhance                     accelerate the ROI from these systems by      SOLUTION
customer                        shaving days or even weeks of process-
engagement,                     ing time off of orders and contracts that     Whether it’s sales teams closing more
electronic sig-                 require signatures.                           deals, banks and credit unions process-
nature                                                                        ing more loans, insurance providers and
                                The cloud has dramatically lowered bar-       agents accelerating the speed to cover-
has gone
                                riers of acceptance. In 2010, DocuSign        age for clients, or healthcare companies
from a “nice
                                introduced the Connect API to increase        getting patients the care they need more
to have” to a                   interoperability with key cloud platforms     quickly, e-signing is helping companies
“must have”                     like Force.com, Ruby and PHP, allowing        transform their processes, automate
business                        developers to easily and securely create      workflows and accelerate transactions to
imperative.                     and integrate native applications with        do business faster and better —all while
                                the DocuSign electronic signature plat-       delighting customers and reducing costs.vi
                                form.
                                                                              In an assessment of DocuSign’s elec-
                                As companies look for innovative ways to      tronic signature platform, Nucleus
                                increase speed to results, reduce costs       Research identified key benefits of utiliz-
                                and enhance customer engagement, elec-        ing DocuSign, including accelerated sales,
                                tronic signature has gone from a “nice to     improved data quality, improved audit
                                have” to a “must have” business impera-       trail and reduced costs.
                                tive. High-availability cloud-based service
                                makes documents readily available wher-       DocuSign can be utilized on a personal
                                ever they need to be accessed from.           level, for a workgroup or across a global
                                                                              enterprise. Using DocuSign Ink, users
                                But, even when dealing with electronic        can legally send and sign documents with
                                signatures, it’s not enough to proclaim       mobile devices while enterprises can accel-
                                trust, reliability and business efficiency.   erate compliance and improve business
                                These factors need to be validated            continuity and disaster recovery by being
                                through extensive third-party audits and      able to access documents any time, from
                                certification of cloud-based vendors.         anywhere.

                                To this end, DocuSign strives to ensure
                                that it is the most continually audited and   ✔ BEST PRACTICES FOR ELECTRONIC
                                highest certified global eSignature ser-      DOCUMENT MANAGEMENT
                                vice in order to provide optimum levels
                                of security assurance. DocuSign is the        Because it is so easy to implement cloud-
                                only eSignature service to achieve global     based services, the role of the CISO in
                                ISO/IEC 27001:2005 certification as an        establishing adoption policies and moni-
vi “Assessing the Benefits of
Electronic Signatures:
                                information security management system        toring best practices across business units
DocuSign,” November 2010.       (ISMS). DocuSign is also continually SSAE     has never been more important.
Nucleus Research Inc.
5
                     No Hiding
                     in the Cloud



Some             To validate the integrity of the docu-           n   Selectable user authentication methods
                                                                      
purported        ment, to manage version control of the               to be commensurate with the transac-
electronic       document, and to ensure oversight of the             tion’s security requirements.
signing          process by the document sender, docu-
                 ments should always be accessed securely
applications
                 during the signing process within their          ✔ CISOS STEPPING UP TO THE PLATE
simply “paste”
                 secure repository.
an image into                                                     Cloud technology has proven ruthless in
a PDF and        Private and confidential documents should        exposing inefficiencies and inconsistent
call it good.    be encrypted in storage so that no one           business processes. Nowhere is that more
                 can read them except those who are               evident than with paper-based signa-
                 authorized. Documents stored with appli-         tures, perhaps the last bastion of the
                 cation-level encryption provide confidenti-      pre-information systems age. As CISOs
                 ality and assurance.                             step up to the plate and take charge of
                                                                  encapsulating security at the forefront of
                 Much like paper counterparts, electroni-         changing business processes, signatures
                 cally signed documents can become the            can no longer stand alone against the tide
                 subject of a dispute. The signature pro-         of efficient, secure and reliable manage-
                 cess must provide enough proof to uphold         ment systems. E-signing enables depart-
                 the transaction.                                 ments and functions across the enterprise
                                                                  to integrate signatures into the systems
                 Some purported electronic signing appli-         and processes required for success in the
                 cations simply “paste” an image into             digital age—but only when those signa-
                 a PDF and call it good. This creates a           tures are trusted.
                 document that has no real value because
                 it does not produce a file that has any          For more information, please visit
                 assurance that a particular person signed        DocuSign at http://esignature.docusign.
                 it. It is not linked to any “proof” to make      com/learnmore.
                 the signature legally binding.

                 Following such best practices, DocuSign’s
                 comprehensive approach includes:

                 n   A digital audit trail that logs associated
                     
                     activities and applies a time/date stamp
                     on all signer actions.

                 n   Secure encryption so the document can
                     
                     be read and signed by only designated
                     users.

                 n   Unique signatures created by each user,
                     
                     accessible only to that user, and stored
                     securely online.

                 n   Signature areas (Stick-eTabs) so signers
                     
                     can initial and sign in specific parts of
                     the document.

Mais conteúdo relacionado

Destaque

Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bisdiedrich2
 
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013Ruth Birdline
 
Food and drink wales
Food and drink walesFood and drink wales
Food and drink walesRuth Birdline
 
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...DocuSign, Inc.
 
April Who's Who
April Who's WhoApril Who's Who
April Who's Wholdahlgren
 
Getting to Yes Faster – Accelerating Your Sales Cycle
Getting to Yes Faster  – Accelerating Your Sales CycleGetting to Yes Faster  – Accelerating Your Sales Cycle
Getting to Yes Faster – Accelerating Your Sales CycleDocuSign, Inc.
 

Destaque (6)

Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bis
 
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013
En sust tour_vet_module2_unit1- gastronomic heritage - updated 20 march 2013
 
Food and drink wales
Food and drink walesFood and drink wales
Food and drink wales
 
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...
Lead-to-Win 2012: Managing People, Process and Technology to Optimize the Las...
 
April Who's Who
April Who's WhoApril Who's Who
April Who's Who
 
Getting to Yes Faster – Accelerating Your Sales Cycle
Getting to Yes Faster  – Accelerating Your Sales CycleGetting to Yes Faster  – Accelerating Your Sales Cycle
Getting to Yes Faster – Accelerating Your Sales Cycle
 

No Hiding in the Cloud: The Telltale Signature of Inefficient, Nonsecure Processes

  • 1. No Hiding in the Cloud: THE TELLTALE As organizations increasingly adopt cloud transforming traditional business pro- SIGNATURE OF technology, the chief information secu- cesses. In CIO magazine’s “2012 State of INEFFICIENT, rity officer (CISO) role is taking on greater the CIO” survey, the cloud was the factor prominence as broker across corporate divi- cited most often as influencing the role of NONSECURE sions in order to ensure proper due diligence the CIO in the next three to five years. PROCESSES is performed and strong data protections are in effect. As a result, many are turning a critical eye on one particular business pro- ✔ SECURE BUSINESS ASSETS cess that continues to defy auditing, lacks IN THE CLOUD anti-tampering controls and eschews digital authentication and authorization: the paper- The cloud equation is indeed a strong one. based, “wet-ink” signature. Today, ROI discussions are often centered around what can be more cost-effectively There’s little doubt that cloud technology, deployed, transitioning previously auto- or IT delivered as a service, is dramatically mated functions “into the cloud” to take
  • 2. 2 No Hiding in the Cloud “With the advantage of the cost benefits, flexibility compliance requirements to protect sensi- increasing and scalability derived from software- tive data and intellectual property. demand and as-a-service (SaaS), infrastructure-as-a- expansion of service (IaaS) and platform-as-a-service The forces transforming the delivery of (PaaS)—utilizing technology as a utility. information technology via cloud and to the global role an increasingly diverse array of mobile of security, According to a report earlier this year sur- devices are also transforming the role of the role of a veying 554 IT professionals, six out of 10 the CISO. As Forrester analyst Andrew modern CISO U.S. companies already have at least one Rose noted in a recent blog, “Security is evolving application in the cloud, and 71 percent management now encompasses much from simply expect to increase spending on cloud ser- more than technology; CISOs can build being a tech- vices in the next 12 months.i In addition their reputation and enhance their per- nical officer to business continuity, the top business sonal career prospects by talking ‘ROI’ to a leader drivers for moving to cloud services are rather than ‘IPS’ and influencing their increasing speed of deployment, gaining colleagues at the highest levels of the in business the flexibility to react to market condi- organization.”ii strategy.” tions, and improving customer support. IDC senior market analyst Naveen Hegde, Yet that same survey indicates significant reviewing results of an IBM survey of concerns that putting data in the cloud CISOs, came to a similar conclusion: also carries risks, with 70 percent of the “With the increasing demand and expan- respondents citing security worries as the sion of the global role of security, the role top barrier to their adoption of cloud com- of a modern CISO is evolving from simply puting. Whether implementing services being a technical officer to a leader in via public cloud, private cloud or a hybrid business strategy.”iii of both, organizations are relying on some form of shared access beyond the One of the key factors in this transfor- walls of the data center, often intending mation of the CISO role is the grow- to increase availability of those resources ing requirement for sharing information to mobile users within or outside of the securely outside of the walls of the enter- organization. prise. According to PriceWaterhouseCoo- pers, “Once seen only as the first step in Already concerned about compliance and asset protection, today’s security plays security for more traditional IT resources, a critical role in enabling the exchange CIOs, CISOs and CEOs now have to worry of sensitive information with other about managing risk and building trust organizations.”iv within a new computing paradigm that is i Lauren Brousell, “CIOs Plan evolving rapidly and along different lines to Increase Cloud Spending,” March 28, 2012. CIO magazine. of deployment. Of paramount importance ✔ PAPER, PEN AND INK: THE WEAK ii Andrew Rose, “Go Beyond to these executives advocating a cloud- LINK IN THE SECURITY CHAIN Technology To Build An Effective Security Practice,” based approach is the determination that July 24, 2012. Forrester Research. the cloud provider offers the same—if not One of the most persistent forms of greater—level of information security as exchanging information with other orga- iii Naveen Hegde, “IBM Study: Changing Role of CISO, from the organization itself. Beyond business nizations is the written signature. Used Technical Officers to Business Strategy Leaders,” efficiency qualifications, the very nature of for myriad purposes, from legally binding July 2, 2012. IDC Insights. a CISO’s responsibilities is to ensure any contracts to proposals to finance applica- iv “How to align security with your strategic business objec- selective adoption of cloud service pro- tions and so on, the “wet-ink” signature tives,” 2005, viders meets stringent due diligence and is a fundamental business process that PriceWaterhouseCoopers LLC.
  • 3. 3 No Hiding in the Cloud “ ocuSign’s D many organizations are still struggling to transmission of paper documents lacks eSignature automate. basic security protections that are rou- services not tinely applied to electronic data, such as Considering the time involved, and the encryption and authentication. So, why only allow effort and cost of printing, faxing, scan- has paper-based signing persisted when for secure ning and overnighting documents of all nearly every business process leading business types for signature—not to mention the up to and following the signature has transactions labor-intensive processes of keying and changed? to be com- rekeying data—it is remarkable how many pleted from of today’s highly automated businesses “Signatures remain small, but important, almost still remain tied to eminently manual components of myriad business transac- anywhere, methods. Many make significant invest- tions,” Gartner Inc. analyst Gregg Kreiz- they make our ments in sales and marketing automa- man wrote in a 2012 report.v “Signature tion to accelerate the acquisition of new requirements can be found in internal and sales process customers and revenue, only to leave the external interactions, but are most sought more efficient, most crucial part of the process—actually as formal components in transactions customer- gaining a binding customer agreement— among parties in different organizations.” centric as well completely manual, time-consuming and as credible.” labor-intensive. While other business processes suc- cumbed to automation, adoption of What is more striking, however, is that electronic signatures, or e-signing, lagged “wet-ink” signatures and paper-based behind, for many reasons. Initially, there documents are inherently unsecure. For were legal issues regarding acceptance of the most part, both can be duplicated, digital signatures on filings and contracts, used by unauthorized parties, and even but the European Community in 1999 and stolen without anyone realizing it. the United States in 2000 adopted legisla- tion to ensure legal validity of electronic Marci McCarthy, president and CEO of signatures and electronic documents. T.E.N. and creator of the Information Security Executive® Programs recognizing Also, before the Web and cloud, organiza- the contributions of security profession- tions were only able to take advantage of als within organizations, is a proponent of on-premise server-based systems, which adopting electronic signature for business were complex and lacked standards for efficiencies and transaction management certification, limiting their appeal at many within a secure platform service. “Docu- organizations that were already struggling Sign’s eSignature services not only allow to maintain disparate systems and facing for secure business transactions to be interoperability issues with partners and completed from almost anywhere, they customers. make our sales process more efficient, customer-centric as well as credible,” McCarthy says. “Furthermore, this type of ✔ E-SIGNING COMES OF AGE product provides T.E.N. and our custom- ers with a virtual repository that is acces- Consumer-facing businesses such as lend- sible, auditable and accountable.” ing and insurance have adapted quickly to customers who are increasingly com- An organization’s most valuable asset fortable with and often expect to be able v Gregg Kreizman, “The Electronic Signature Market Is outside of its employees is the intellectual to transact all activity electronically from Poised to Take Off,” May 21, property around the data it transacts, yet their desktops, laptops, mobile phones 2012. Gartner Inc
  • 4. 4 No Hiding in the Cloud As companies and tablets. That has dramatically trans- 16 examined and tested, PCI DSS 2.0 look for inno- formed acceptance, adoption and use of compliant as both a merchant and level- vative ways e-signing. one service provider, TRUSTe certified and a member of the U.S. Department of to increase Organizations reliant on customer rela- Commerce Safe Harbor. speed to tionship management (CRM) or sales results, force automation (SFA) systems have reduce costs come to recognize that e-signing can ✔ WHY E-SIGNING IS A BETTER and enhance accelerate the ROI from these systems by SOLUTION customer shaving days or even weeks of process- engagement, ing time off of orders and contracts that Whether it’s sales teams closing more electronic sig- require signatures. deals, banks and credit unions process- nature ing more loans, insurance providers and The cloud has dramatically lowered bar- agents accelerating the speed to cover- has gone riers of acceptance. In 2010, DocuSign age for clients, or healthcare companies from a “nice introduced the Connect API to increase getting patients the care they need more to have” to a interoperability with key cloud platforms quickly, e-signing is helping companies “must have” like Force.com, Ruby and PHP, allowing transform their processes, automate business developers to easily and securely create workflows and accelerate transactions to imperative. and integrate native applications with do business faster and better —all while the DocuSign electronic signature plat- delighting customers and reducing costs.vi form. In an assessment of DocuSign’s elec- As companies look for innovative ways to tronic signature platform, Nucleus increase speed to results, reduce costs Research identified key benefits of utiliz- and enhance customer engagement, elec- ing DocuSign, including accelerated sales, tronic signature has gone from a “nice to improved data quality, improved audit have” to a “must have” business impera- trail and reduced costs. tive. High-availability cloud-based service makes documents readily available wher- DocuSign can be utilized on a personal ever they need to be accessed from. level, for a workgroup or across a global enterprise. Using DocuSign Ink, users But, even when dealing with electronic can legally send and sign documents with signatures, it’s not enough to proclaim mobile devices while enterprises can accel- trust, reliability and business efficiency. erate compliance and improve business These factors need to be validated continuity and disaster recovery by being through extensive third-party audits and able to access documents any time, from certification of cloud-based vendors. anywhere. To this end, DocuSign strives to ensure that it is the most continually audited and ✔ BEST PRACTICES FOR ELECTRONIC highest certified global eSignature ser- DOCUMENT MANAGEMENT vice in order to provide optimum levels of security assurance. DocuSign is the Because it is so easy to implement cloud- only eSignature service to achieve global based services, the role of the CISO in ISO/IEC 27001:2005 certification as an establishing adoption policies and moni- vi “Assessing the Benefits of Electronic Signatures: information security management system toring best practices across business units DocuSign,” November 2010. (ISMS). DocuSign is also continually SSAE has never been more important. Nucleus Research Inc.
  • 5. 5 No Hiding in the Cloud Some To validate the integrity of the docu- n Selectable user authentication methods purported ment, to manage version control of the to be commensurate with the transac- electronic document, and to ensure oversight of the tion’s security requirements. signing process by the document sender, docu- ments should always be accessed securely applications during the signing process within their ✔ CISOS STEPPING UP TO THE PLATE simply “paste” secure repository. an image into Cloud technology has proven ruthless in a PDF and Private and confidential documents should exposing inefficiencies and inconsistent call it good. be encrypted in storage so that no one business processes. Nowhere is that more can read them except those who are evident than with paper-based signa- authorized. Documents stored with appli- tures, perhaps the last bastion of the cation-level encryption provide confidenti- pre-information systems age. As CISOs ality and assurance. step up to the plate and take charge of encapsulating security at the forefront of Much like paper counterparts, electroni- changing business processes, signatures cally signed documents can become the can no longer stand alone against the tide subject of a dispute. The signature pro- of efficient, secure and reliable manage- cess must provide enough proof to uphold ment systems. E-signing enables depart- the transaction. ments and functions across the enterprise to integrate signatures into the systems Some purported electronic signing appli- and processes required for success in the cations simply “paste” an image into digital age—but only when those signa- a PDF and call it good. This creates a tures are trusted. document that has no real value because it does not produce a file that has any For more information, please visit assurance that a particular person signed DocuSign at http://esignature.docusign. it. It is not linked to any “proof” to make com/learnmore. the signature legally binding. Following such best practices, DocuSign’s comprehensive approach includes: n A digital audit trail that logs associated activities and applies a time/date stamp on all signer actions. n Secure encryption so the document can be read and signed by only designated users. n Unique signatures created by each user, accessible only to that user, and stored securely online. n Signature areas (Stick-eTabs) so signers can initial and sign in specific parts of the document.