Image
data security in intelligent document processing

Data Security in Intelligent Document Processing: Kanverse approach

April 8, 2024

Home/Blogs/Data Security in Intelligent Document Processing:Kanverse approach.
Data Security in Intelligent Document Processing
#Blog   Published On April 03, 2024

Data Security in Intelligent Document Processing:
Kanverse approach.

Intelligent Document Processing revolutionizes how businesses handle information in the fast-paced digital age. As we look to the future of document processing, we see a changing environment driven by increased security measures, industry-specific customization, artificial intelligence (AI), and a growing sustainability consciousness.  

AI is the main factor influencing IDP's ongoing evolution. Thanks to machine learning and natural language processing advancements, AI is enabling more intelligent and autonomous document processing systems. Intelligent Document Processing systems learn from user interactions, enabling them to continuously improve their performance. This degree of flexibility guarantees that IDP solutions can keep up with the dynamic nature of document formats and structures.

Securing sensitive data is crucial at a time when cyber threats and data breaches are becoming more frequent. Future developments in IDP will center on strengthening security protocols to shield sensitive information from malevolent intrusions and unapproved access. Robust security measures have become essential as firms move to digital document processing. To protect sensitive data, intelligent document processing systems will include multi-factor authentication, secure access controls, and cutting-edge encryption methods. Anomalies in document access patterns can be identified using AI & ML models, which can then be used to send out alerts about possible security breaches.

Kanverse Hyperautomation platform intelligently automates document processing heavy workflows for enterprises. Kanverse brings together multiple AI technologies - Computer Vision, Natural Language Processing, Machine Learning, and Fuzzy Logic, along with Business rules and workflows to accomplish end to end automation. Kanverse is a SaaS product with a multi-tenant architecture – helping it meet security standards and seamlessly scalable based on business needs. It is designed to be simultaneously used by multiple customers across different regions. Kanverse runs on Microsoft Azure scalable IaaS. The system is built for high availability of 99.99% and in the event of any system failures all the traffic is automatically routed to the backup system without downtime. The system is highly scalable and in case of increase in traffic, it is able to scale up both vertically and horizontally, to optimize the resources

 

User security Measures:

● User account security

Kanverse provides secure access to all the data needed to perform business functions. Duties and areas of responsibility are well segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's information or data. The user is allocated secure access through a dedicated account. All users have a unique User ID and password, along with two-factor authentication, to use the account, which provides individual accountability to all systems. There is no shared ID used by multiple employees. User authentication credentials are protected and stored using the AES 254 encryption algorithm when at rest.

● Role-based access

Each user in Kanverse is allocated role-based access, which gives various privileges to the number of users according to the Kanverse hierarchy.

Organization Hierarchy

In Kanverse, hierarchy is set up at many levels. The document is approved step-by-step and pushed to storage once unanimous approval is fetched at all levels.

SSO

Kanverse provides support for single sign-on. Customers can integrate their instances with a single-sign-on provider using SAML. The user can log in through their existing account to the Kanverse platform without sharing the user ID and password with the Kanverse system. Kanverse supports SSO with the following single-sign-on providers -

  1. Microsoft Azure
     
  2. Okta
     
  3. OneLogin

Data Security:

Handling Personally Identifiable Information (PII)

Kanverse is designed to identify and redact PII sensitive information from documents. You can also create role-based views to control access to restricted content while providing others with a redacted view. Kanverse automates the redaction of multiple documents in a single process and removes the sensitive information and related metadata without touching the source file.

Data encryption

Kanverse uses industry-standard encryption protocols and cipher suites. Customer data is encrypted in transit and at rest. All production systems are hardened and regularly monitored to disable the use of weak ciphers.

Data retention

Kanverse has its data retention policy, which the customer has agreed upon. Customers have complete control over the information they wish to retain and for how long it is kept. Additionally, all critical data and configurations are automatically backed up.

Data Deletion

User data security is never compromised in Kanverse; documents are uploaded and immediately deleted after they have been processed according to a predefined rule.

Data loss prevention

In Kanverse, all systems are installed with endpoint protection. All customer data is regularly backed up through an automated process. Monthly audits and tests validate the backups and restoration process.

Learn more about Technology

Data Confidentiality:

We have strict access controls in place for all users. Client data is only accessible to employees who are authorized to see it. IT administrators are restricted from viewing customer data unless it is required to perform troubleshooting functions. Audit policies enforce logging of access to customer data. Granular access control is in place within the application, and access to a specific user is provided based on the user's role based on business requirements. Different hierarchies are defined in the system based on access rights and role management. Access control is responsible for content management for the users authorized to access the portal. The user will only see the data according to the role assigned to the user as defined in the role management. All our employees and contract personnel are bound by our information security policies regarding the protection of sensitive and organizational data.

Availability & Disaster Recovery

We use AIOps based measurement tool that actively monitors the availability & performance of application services. The production environment has been designed in such a way to be resilient against any single or multiple failures in the application components services or the entire data center. The infrastructure management team tests disaster recovery procedures regularly. The Network Operation team is available 24*7 to monitor and quickly mitigate any incident within the infrastructure.

 
 

What is human-centered hyperautomation? 

Incident Management & Response

Kanverse has a well-defined Incident Management procedure that sets out a framework of governance and accountability for security incidents. In the event of a security incident, Kanverse will promptly notify the customer. Our privacy breach response plan ensures that we can swiftly identify privacy breaches and contain any privacy risks.

Incident Response and Recovery Plan Testing

Kanverse tests the Business Continuity, Disaster Recovery, and Incident Response & Recovery Plan annually. These test results are reviewed, and any necessary corrective actions are taken. Types of tests done by Kanverse include:

  1. Walk-through exercises
     
  2. Tabletop exercises
     
  3. Checklists
     
  4. Parallel simulations
Information Security Audit

Third-party qualified accessors perform the audit. The audit team (IA team) is responsible for ensuring compliance with the ISMS framework in all aspects. The IA team meets on an annual basis. They have the following responsibilities:

  1. Conduct internal audits to assess conformance to the standard, the organization's policies, the effectiveness of implementation, and maintenance.
     
  2. Define and document procedures, including responsibilities and requirements for planning and conducting audits, reporting results, and maintaining records.
     
  3. Evaluate the organization's compliance with the ISMS framework in all aspects.
     
  4. Detect any shortcomings in the implementation of the ISMS framework within the organization.
     
  5. To ensure deployment of robust information security framework.
     
  6. To recommend the necessary corrective and preventive actions.
     
  7. To ensure continuous improvement of information security controls.
Vulnerability Assessment and Penetration Testing

Vulnerability Assessment & Penetration testing of all production systems & applications is done regularly. This is done internally and using a third-party security vendor. VAPT assessment is carried out in 4 phases:

  1. Conduct Assessment
     
  2. Identify Exposures
     
  3. Address Exposures
     
  4. Remediation and Compliance

Compliance Adherence:

SOC2- Type 2

SOC 2 Type 2 certification is awarded to Kanverse by an independent auditing body; it guarantees the secured processing of customer data by third-party service providers. This certification is based on the five service principles - secured environment, processing integrity, data availability, data confidentiality, and data privacy.

There are many benefits for the customer for choosing a SOC 2-certified vendor to extract data from documents like Kanverse.ai:

  1. Enhanced credibility and trustworthiness
     
  2. Powerful data protection architecture
     
  3. Robust mechanism to prevent data breaches.
     
  4. Lawsuit and bankruptcy protection.
     
  5. Guaranteed better service.
     
  6. High operating effectiveness.
     
  7. Long-term cost savings and loss prevention
ISO27001:2013

Kanverse adheres to the ISO/IEC 27001:2013 standard for information security management. This standard encompasses a framework of policies, procedures, and controls that cover legal, physical, and technical aspects of information risk management. Its objective is to establish and maintain a robust information security measure within the organization. By following this standard, Kanverse demonstrates its commitment to effectively managing information security risks and protecting its information assets' confidentiality, integrity, and availability.

ISO270000-1:2011

Kanverse follows the ISO270000-1:2011 service management system (SMS) standard. Compliance with ISO/IEC 20000-1:2011 ensures that Kanverse has implemented robust processes and controls to manage its services effectively. It provides a framework for continuous improvement, enabling Kanverse to enhance its service delivery and maintain customer satisfaction.

GDPR

Kanverse adheres to relevant data protection and privacy regulations, such as the GDPR, applicable to its industry and geographical location. The GDPR gives individuals control over personal data and provides the regulatory environment for international business. By complying with the GDPR, Kanverse prioritizes protecting sensitive information and respects individuals' privacy rights.

Kanverse.ai, a Hyperautomation company, offers a cloud-based platform and a suite of products that can support various use cases across the enterprise to remove bottlenecks, streamline business processes, and minimize manual touch points across workflows. Our flagship product is AI-powered Kanverse Intelligent Document Processing (IDP) that supports the processing of unstructured, semi-structured, and structured documents. Kanverse delivers solutions for AP Invoice Automation, Sales Order Automation, Insurance Document Processing Automation, and KYC & KYB Automation. Learn more at: www.kanverse.ai

Learn more about Security Policy 

Lets Connect

About the Author

linkedin
Kingshuk Ghosh

Principal Product Manager, Kanverse.ai

 

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.