Lifecycle Journey: How Digital Documents Optimize Contract Processes
- LANGUAGE: English DATE: Tuesday, March 01, 2016 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
This webinar follows the lifecycle of a document: Digital contracts go through many phases throughout their existence. From the production of the document, through presentation, revisions, and then being signed by the involved parties. But the journey doesn't end there. If the contract is valid for a long time, periodic re-sealing is also required, to ensure its validity as well in the future.
Digital documents have plenty of advantages compared to paper-based alternatives. They flow faster back and forth between the sending and receiving parties, even signatures between several business partners working all at different ends of the globe are gathered within a few moments. Last but not least they also save postal and courier costs.
However, appropriate digital document solutions have to be thoroughly secured and they have to meet all different juridical norms of the countries in which they are being deployed. Thus they have to fulfill all but small technological demands.
This KuppingerCole Webinar provides information on
- encrypted digital signing of documents on the Internet
- the differences between electronic and digital signatures
- electronic identity and electronic/digital signature solutions
- hosting and management of identity data
- the juridical requirements of digital contracts
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the basic technical processes around digital documents and talk about their general advantages compared to traditional (paper-based) document processes.
In the second part, John Erik Setsaas, Senior Development Architect at Signicat, will describe his company’s digital document solutions and special requirements such as periodic re-sealing in detail. He will also present customer use cases and share experiences from the Nordic market.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.