Manage access rights to enforce security and compliance

Configure repository design and access controls to manage access to sensitive content.

  • Restrict access to folders, documents, fields, annotations and other granular document properties.
  • Inherit active directory groups for easy security maintenance.
  • Control exactly who can view content with individual document security tags.
  • Use security filters to vary access rights within folders without needing to configure security settings for each individual document.
  • Configure who can create document templates, create links between documents and apply stamps and other notations.
security and compliance

Protect information from unauthorized access or disclosure

Ensure records integrity with precise document control.

sec_03

Protect sensitive metadata by controlling information access down to individual folders, templates and fields.

sec_05

Send alerts when specified documents are printed or exported.

sec_09

Automatically apply watermarks to control printed and exported copies of documents.

sec_10

Prevent users from accessing system information stored on Oracle and SQL servers with database security settings.

sec_14

Encrypt data up up to AES-256 and use SSL/TLS encryption between applications.

sec_13

Securely publish to the web with built-in IIS access security and firewall configurations.

Redact confidential information

sec2_03

Choose between whiteout and blackout redactions to secure confidential information.

sec2_05

Securely publish to the web with built-in IIS access security and firewall configurations.

sec2_09

Black out text upon document import and export.

sec2_10

Ensure redaction persists upon printing and export.

Redact confidential information

Verify document integrity and authentic
archiving

Ensure long-term data preservation with a standard format that meets the
Victorian Electronic Record Strategy (VERS) requirements.

sec3_03

Automatically apply digital signatures to authenticate document approval.

sec3_05

Automatically detect if changes are made to files outside of the Laserfiche environment.

sec3_07

Notify users if documents contain data loss or corruption using volume checksums.

Enforce compliance from the moment records are created

Maintain accurate records with DoD 5015.2-certified records management

Enforce compliance from the moment records are created
  • Auto-classify, apply disposition schedules and other regulatory retention rules using metadata and other information on incoming records.
  • Automatically create record folders and move documents into the appropriate locations.
  • Set up notifications for document destruction.
  • Enforce records management policies across all devices.
  • Generate reports to identify and locate records that are ready for disposition.

Audit user actions across all devices

Track system use to form a complete record of organization-wide activity.

Audit user actions across all devices
  • Monitor system login/out, document creation/destruction, password changes and more.
  • Log user actions taken on smartphones and tablets.
  • Generate web-based audit reports that outline the time, user and changes associated with all system modifications.
  • Track all changes made to security settings at the user, document and system level.