SlideShare una empresa de Scribd logo
1 de 28
The Business Case for Document Integrity A presentation fromCrawford Technologies Inc. www.crawfordtech.com Follow, Like and Join us at about.me/CrawfordTechInc
Definitions & Terms The Problem the business case couldn’t be built The Two Drivers of Your Business Case: Quantifiable Benefits Costs The Benefits of Document Integrity have Increased The Costs of Document Integrity have Decreased Conclusion & Wrap up Agenda
Definitions & Terms ADF “An architecture for efficiently and cost-effectively producing internal and external printed transaction documents” “To ensure lower costs, higher quality, integrity and process controls”
Definitions & Terms ADF Defined and named by Gartner in 1995 as: Input – the data enters the ADF Transformation & Integrated Output – production onto appropriate media Delivery Preparation – documents are prepared for delivery to the recipient Control & Reporting – production management of the ADF - sits over the other 3 modules The Interfaces between the 4 modules
ADF 2.0 (Gartner 2007) adds two new modules: Document Design and Content Integration – Business rule design & placement of all variable data & messaging components Response Management – Ongoing analysis of customer behaviors to maximize customer lifetime value Definitions & Terms
Definitions & Terms Document Integrity: A service level quality standard that transactional document production is measured against. It specifically measures the quantity of ‘co-mingles’ and other privacy related document production errors. It is measured in %, for example, “99.5% error free of document integrity errors”. ,[object Object]
A system that uses camera technology to visually inspect the physical production of transactional customer documents. It monitors, tabulates and reports on all activities to significantly reduce errors.,[object Object]
In response, many organizations are demanding significant “proof of process” reporting and evidence that appropriate processes, best practices and appropriate controls are in place.
This applies to internal operations and print service providers.,[object Object]
Business cases for acquisition, installation and operation of a Document Integrity system have often failed to receive approval. ,[object Object]
The cost of poor document integrity has not often been fully quantified
The cost to acquire a document integrity system has historically been very expensive.
The vendor fees to integrate, install and configure a document integrity system have traditionally been very expensive.The Problem
The Two Drivers of your Business Case: Quantifiable Benefits & Costs A traditional business case is typically measured either by its Return on Investment (ROI) or its Payback. ,[object Object]
For example the Payback for a traditional Document Integrity project may be 15 months.,[object Object]
For example, the ROI for the Document Integrity Project is 12%.
Remember that your project will be measured financially against other projects in your organization and your project will be ranked against them using ROI, Payback or some other financial method.,[object Object]
Postage?
Overtime?
Production Costs?
Labor?
Other?,[object Object]
Performance penalties, if you are a service provider,[object Object]
The Benefits of Document Integrity Have Increased For example: your customer is not profitable until year 4 and then profitability accumulates quickly due to cross purchasing, upgrading and by recommending your companies products and services to friends and family So what happens when a customer leaves after 3.5 years due to a privacy breach? You have lost money on that customer and the replacement customer will lose you money once you acquire them Customer Lifetime Value will strengthen your business case.
The Benefits of Document Integrity Have Increased Customer Lifetime Value – costs and profits “It costs a wireless phone company at least $300 to acquire a consumer client and upwards of $60,000 to acquire a corporate client” - Peppers & Rogers “A 5% increase in customer loyalty can translate to a 75% increase in profitability” - Gartner Group “It costs 5 to 10 times as much to get a customer than to keep a customer” - Harvard Business School Customer Lifetime Value for the banking industry runs at between $140 to $220 per client (profit) - Database Marketing Institute Customer Lifetime Value for the insurance industry runs at around $5,500 per client (profit) - University of Groningen
Costs Have Come Down New Document Integrity systems are now available at costs that are significantly lower than in the past Costly upgrades to intelligent inserters are not required.  Long, complex installation projects are not required.  Large professional services bills can be avoided. These systems automatically reprint damaged pieces. These systems can automatically improve production efficiency These systems can automatically prepare your existing work for an integrity system. Add barcodes, create tracking files, etc. These systems significantly reduce document integrity errors with Six Sigma-class document integrity quality rates!
Conclusions and Wrap Up The quantifiable benefits of reducing document integrity errors are now more measurable than ever.  You can now improve the monetary benefits aspect of your Payback and ROI calculations by including lifetime value data and by including new efficiency gains  The one time capital costs and professional services fees have come down significantly, as have the ongoing maintenance and support fees. Reduced Costs and Increased Monetary Benefits mean that you can now have a winning business case!  Now is the time to rebuild your business case to improve document integrity in your organization. Make sure this is in your budget for next year!
US and International Privacy Laws State, Federal and International Privacy Laws - Courtesy of: White Space Marketing. Inc.  The following list contains a number of US Federal privacy related laws: Americans with Disabilities Act (ADA) - Primer for business.  Cable Communications Policy Act of 1984 (Cable Act)  California Senate Bill 1386 (SB 1386) - Chaptered version.  Children's Internet Protection Act of 2001 (CIPA)  Children's Online Privacy Protection Act of 1998 (COPPA)  Communications Assistance for Law Enforcement Act of 1994 (CALEA) - Official CALEA website.  Computer Fraud and Abuse Act of 1986 (CFAA) law summary. Full text at Cornell  Computer Security Act of 1987 - (Superseded by the Federal Information Security Management Act (FISMA) Consumer Credit Reporting Reform Act of 1996 (CCRRA) - Modifies the Fair Credit Reporting Act (FCRA).

Más contenido relacionado

La actualidad más candente

ITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseSamanage
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Maru Schietekat
 
How to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyHow to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyNeoStreamTech
 
Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...3gamma
 
Why should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementWhy should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementGilles Declercq
 
Research paper on EDI
 Research paper on EDI  Research paper on EDI
Research paper on EDI Ankur Wani
 
Rethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingRethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingBARRY ROSS
 
Navigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingNavigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingLogikcull
 
Innovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsInnovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsSachaWalsh
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Legal_Tech_Report_2016
Legal_Tech_Report_2016Legal_Tech_Report_2016
Legal_Tech_Report_2016Temelko Dechev
 
e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...The Digital Group
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningPolsinelli PC
 
The Added Value of Business Consolidation
The Added Value of Business ConsolidationThe Added Value of Business Consolidation
The Added Value of Business Consolidationeprentise
 
White Paper Automate Contract Workflows
White Paper Automate Contract WorkflowsWhite Paper Automate Contract Workflows
White Paper Automate Contract Workflowselixenne
 

La actualidad más candente (19)

The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
ITSM SaaS vs. On-Premise
ITSM SaaS vs. On-PremiseITSM SaaS vs. On-Premise
ITSM SaaS vs. On-Premise
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
 
How to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case StudyHow to Manage Your Documents: Visual Case Study
How to Manage Your Documents: Visual Case Study
 
Enterprise EDI Integration
Enterprise EDI IntegrationEnterprise EDI Integration
Enterprise EDI Integration
 
Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...Leveraging IT to create business agility: Why leading IT organisations are re...
Leveraging IT to create business agility: Why leading IT organisations are re...
 
Why should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurementWhy should mid-market companies invest in eprocurement
Why should mid-market companies invest in eprocurement
 
Research paper on EDI
 Research paper on EDI  Research paper on EDI
Research paper on EDI
 
Rethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs OutsourcingRethinking payroll performance: In-House vs Outsourcing
Rethinking payroll performance: In-House vs Outsourcing
 
Navigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery BillingNavigating the High-Stakes World of eDiscovery Billing
Navigating the High-Stakes World of eDiscovery Billing
 
Innovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firmsInnovative kp is are critical to secure greater value from law firms
Innovative kp is are critical to secure greater value from law firms
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
EDI makes money
EDI makes moneyEDI makes money
EDI makes money
 
Legal_Tech_Report_2016
Legal_Tech_Report_2016Legal_Tech_Report_2016
Legal_Tech_Report_2016
 
Healthcare HIPAA Edi x12 basics 1
Healthcare HIPAA Edi x12 basics 1Healthcare HIPAA Edi x12 basics 1
Healthcare HIPAA Edi x12 basics 1
 
e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...e-Filing: Immediate Operational benefits to UCC filings, public record search...
e-Filing: Immediate Operational benefits to UCC filings, public record search...
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
The Added Value of Business Consolidation
The Added Value of Business ConsolidationThe Added Value of Business Consolidation
The Added Value of Business Consolidation
 
White Paper Automate Contract Workflows
White Paper Automate Contract WorkflowsWhite Paper Automate Contract Workflows
White Paper Automate Contract Workflows
 

Similar a The Business Case for Document Integrity

Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality ProjectsInnovative_Systems
 
Ensur= let's get phygital
Ensur= let's get phygitalEnsur= let's get phygital
Ensur= let's get phygitalComarch
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
ILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal TechnologyILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal Technologygrudoy
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"Peter Coffee
 
iTEMize - TEM
iTEMize - TEMiTEMize - TEM
iTEMize - TEMamelmed
 
Peter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee
 
Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Company Spotlight
 
Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Company Spotlight
 
T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...The Digital Group
 
ROI Document Management White Paper
ROI Document Management White PaperROI Document Management White Paper
ROI Document Management White PaperLarry Levine
 
4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docxblondellchancy
 
Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Crawford Technologies, Inc.
 
Up to Your Assets in Technology?
Up to Your Assets in Technology?Up to Your Assets in Technology?
Up to Your Assets in Technology?Avaya Inc.
 
Topic 1 enterprise pressures and the need for services innovation
Topic 1   enterprise pressures and the need for services innovationTopic 1   enterprise pressures and the need for services innovation
Topic 1 enterprise pressures and the need for services innovationZaheer Travadi
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case studyWGroup
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 

Similar a The Business Case for Document Integrity (20)

Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality Projects
 
Ensur= let's get phygital
Ensur= let's get phygitalEnsur= let's get phygital
Ensur= let's get phygital
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
ILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal TechnologyILTA 2011 Integration of Legal Technology
ILTA 2011 Integration of Legal Technology
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011   Integration Of Legal TechnologyILTA 2011   Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
iTEMize - TEM
iTEMize - TEMiTEMize - TEM
iTEMize - TEM
 
Peter Coffee on Cloud Transformation
Peter Coffee on Cloud TransformationPeter Coffee on Cloud Transformation
Peter Coffee on Cloud Transformation
 
Direct Insite Presentation December 2013
Direct Insite Presentation December 2013Direct Insite Presentation December 2013
Direct Insite Presentation December 2013
 
Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013Direct Insite Presentation - October 2013
Direct Insite Presentation - October 2013
 
T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...T/DG provides production support solutionsfor operational efficiency and prod...
T/DG provides production support solutionsfor operational efficiency and prod...
 
ROI Document Management White Paper
ROI Document Management White PaperROI Document Management White Paper
ROI Document Management White Paper
 
4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx4900 words required………………….e-Procure.docx
4900 words required………………….e-Procure.docx
 
Boeing
BoeingBoeing
Boeing
 
Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management Document Integrity - Maximize Your Benefits Through Production Management
Document Integrity - Maximize Your Benefits Through Production Management
 
Up to Your Assets in Technology?
Up to Your Assets in Technology?Up to Your Assets in Technology?
Up to Your Assets in Technology?
 
Topic 1 enterprise pressures and the need for services innovation
Topic 1   enterprise pressures and the need for services innovationTopic 1   enterprise pressures and the need for services innovation
Topic 1 enterprise pressures and the need for services innovation
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case study
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 

Más de Crawford Technologies, Inc.

38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing ItCrawford Technologies, Inc.
 
Inkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryInkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryCrawford Technologies, Inc.
 
Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Crawford Technologies, Inc.
 
33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing ItCrawford Technologies, Inc.
 
33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing ItCrawford Technologies, Inc.
 
3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations EfficiencyCrawford Technologies, Inc.
 

Más de Crawford Technologies, Inc. (11)

38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It38 Things You Can Do With a Print File Besides Printing It
38 Things You Can Do With a Print File Besides Printing It
 
Inkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper FactoryInkjet Case Study: Implementing a Plain Paper Factory
Inkjet Case Study: Implementing a Plain Paper Factory
 
Crawford Technologies Overview 2014
Crawford Technologies Overview 2014Crawford Technologies Overview 2014
Crawford Technologies Overview 2014
 
Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...Why routine customer communications could be the secret weapon in direct mark...
Why routine customer communications could be the secret weapon in direct mark...
 
33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It33+5 Things You Can Do with a Print File Besides Printing It
33+5 Things You Can Do with a Print File Besides Printing It
 
33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It33 Things You Can Do with a Print File Besides Printing It
33 Things You Can Do with a Print File Besides Printing It
 
Legacy Print Streams - What's the Big Deal?
Legacy Print Streams - What's the Big Deal?Legacy Print Streams - What's the Big Deal?
Legacy Print Streams - What's the Big Deal?
 
Transpromo on a Budget
Transpromo on a Budget Transpromo on a Budget
Transpromo on a Budget
 
Crawford Technologies Overview January 2011
Crawford Technologies Overview January 2011Crawford Technologies Overview January 2011
Crawford Technologies Overview January 2011
 
3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency3 Opportunities to Increase Your Printing Operations Efficiency
3 Opportunities to Increase Your Printing Operations Efficiency
 
Xerox Print Datastreams
Xerox Print DatastreamsXerox Print Datastreams
Xerox Print Datastreams
 

Último

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

The Business Case for Document Integrity

  • 1. The Business Case for Document Integrity A presentation fromCrawford Technologies Inc. www.crawfordtech.com Follow, Like and Join us at about.me/CrawfordTechInc
  • 2. Definitions & Terms The Problem the business case couldn’t be built The Two Drivers of Your Business Case: Quantifiable Benefits Costs The Benefits of Document Integrity have Increased The Costs of Document Integrity have Decreased Conclusion & Wrap up Agenda
  • 3. Definitions & Terms ADF “An architecture for efficiently and cost-effectively producing internal and external printed transaction documents” “To ensure lower costs, higher quality, integrity and process controls”
  • 4. Definitions & Terms ADF Defined and named by Gartner in 1995 as: Input – the data enters the ADF Transformation & Integrated Output – production onto appropriate media Delivery Preparation – documents are prepared for delivery to the recipient Control & Reporting – production management of the ADF - sits over the other 3 modules The Interfaces between the 4 modules
  • 5. ADF 2.0 (Gartner 2007) adds two new modules: Document Design and Content Integration – Business rule design & placement of all variable data & messaging components Response Management – Ongoing analysis of customer behaviors to maximize customer lifetime value Definitions & Terms
  • 6.
  • 7.
  • 8. In response, many organizations are demanding significant “proof of process” reporting and evidence that appropriate processes, best practices and appropriate controls are in place.
  • 9.
  • 10.
  • 11. The cost of poor document integrity has not often been fully quantified
  • 12. The cost to acquire a document integrity system has historically been very expensive.
  • 13. The vendor fees to integrate, install and configure a document integrity system have traditionally been very expensive.The Problem
  • 14.
  • 15.
  • 16. For example, the ROI for the Document Integrity Project is 12%.
  • 17.
  • 22.
  • 23.
  • 24. The Benefits of Document Integrity Have Increased For example: your customer is not profitable until year 4 and then profitability accumulates quickly due to cross purchasing, upgrading and by recommending your companies products and services to friends and family So what happens when a customer leaves after 3.5 years due to a privacy breach? You have lost money on that customer and the replacement customer will lose you money once you acquire them Customer Lifetime Value will strengthen your business case.
  • 25. The Benefits of Document Integrity Have Increased Customer Lifetime Value – costs and profits “It costs a wireless phone company at least $300 to acquire a consumer client and upwards of $60,000 to acquire a corporate client” - Peppers & Rogers “A 5% increase in customer loyalty can translate to a 75% increase in profitability” - Gartner Group “It costs 5 to 10 times as much to get a customer than to keep a customer” - Harvard Business School Customer Lifetime Value for the banking industry runs at between $140 to $220 per client (profit) - Database Marketing Institute Customer Lifetime Value for the insurance industry runs at around $5,500 per client (profit) - University of Groningen
  • 26. Costs Have Come Down New Document Integrity systems are now available at costs that are significantly lower than in the past Costly upgrades to intelligent inserters are not required. Long, complex installation projects are not required. Large professional services bills can be avoided. These systems automatically reprint damaged pieces. These systems can automatically improve production efficiency These systems can automatically prepare your existing work for an integrity system. Add barcodes, create tracking files, etc. These systems significantly reduce document integrity errors with Six Sigma-class document integrity quality rates!
  • 27. Conclusions and Wrap Up The quantifiable benefits of reducing document integrity errors are now more measurable than ever. You can now improve the monetary benefits aspect of your Payback and ROI calculations by including lifetime value data and by including new efficiency gains The one time capital costs and professional services fees have come down significantly, as have the ongoing maintenance and support fees. Reduced Costs and Increased Monetary Benefits mean that you can now have a winning business case! Now is the time to rebuild your business case to improve document integrity in your organization. Make sure this is in your budget for next year!
  • 28. US and International Privacy Laws State, Federal and International Privacy Laws - Courtesy of: White Space Marketing. Inc. The following list contains a number of US Federal privacy related laws: Americans with Disabilities Act (ADA) - Primer for business. Cable Communications Policy Act of 1984 (Cable Act) California Senate Bill 1386 (SB 1386) - Chaptered version. Children's Internet Protection Act of 2001 (CIPA) Children's Online Privacy Protection Act of 1998 (COPPA) Communications Assistance for Law Enforcement Act of 1994 (CALEA) - Official CALEA website. Computer Fraud and Abuse Act of 1986 (CFAA) law summary. Full text at Cornell Computer Security Act of 1987 - (Superseded by the Federal Information Security Management Act (FISMA) Consumer Credit Reporting Reform Act of 1996 (CCRRA) - Modifies the Fair Credit Reporting Act (FCRA).
  • 29. US and International Privacy Laws The following list contains a number of US Federal privacy related laws (continued): Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 law overview. Text of law at Cornell library Electronic Funds Transfer Act (EFTA) Summary Fair and Accurate Credit Transactions Act (FACTA) of 2003 Fair Credit Reporting Act (Full Text). Federal Information Security Management Act (FISMA) Federal Trade Commission Act (FTCA) Driver's Privacy Protection Act of 1994 . Text of law at Cornell Electronic Communications Privacy Act of 1986 (ECPA) Electronic Freedom of Information Act of 1996 (E-FOIA) Discussion as it related to the Freedom of Information Act.
  • 30. US and International Privacy Laws The following list contains a number of US Federal privacy related laws (continued): Fair Credit Reporting Act of 1999 (FCRA) Family Education Rights and Privacy Act of 1974 (FERPA; also know as the Buckley Amendment) Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) Privacy Act of 1974 - including U.S. Department of Justice Overview Privacy Protection Act of 1980 (PPA) Right to Financial Privacy Act of 1978 (RFPA) Telecommunications Act of 1996 Telephone Consumer Protection Act of 1991 (TCPA) Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) Video Privacy Protection Act of 1988 discussion and overview. Text of law at: Cornell Law Library
  • 31. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Argentina: Personal Data Protection Act of 2000 (aka Habeas Data) Austria: Data Protection Act 2000, Austrian Federal Law Gazette part I No. 165/1999 (Datenschutzgesetz 2000 or DSG 2000). Australia: Privacy Act of 1988 Belgium: Belgium Data Protection Law and Belgian Data Privacy Commission Privacy Blog Brazil: Privacy currently governed by Article 5 of the 1988 Constitution. Bulgaria: The Bulgarian Personal Data Protection Act, was adopted on December 21, 2001 and entered into force on January 1, 2002. More information at the Bugarian Data Protection Authority Canada: The Privacy Act - July 1983 Personal Information Protection and Electronic Data Act (PIPEDA) of 2000 (Bill C-6) Chile: Act on the Protection of Personal Data, August 1998
  • 32. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Colombia: Two laws affecting data privacy - Law 1266 of 2008: (in Spanish) and Law 1273 of 2009 (in Spanish) Also, the constitution provides any person the right to update their personal information Czech Republic: Act on Protection of Personal Data (April 2000) No. 101 Denmark: Act on Processing of Personal Data, Act No. 429, May 2000. Estonia: Personal Data Protection Act of 2003. June 1996, Consolidated July 2002. European Union: European Union Data Protection Directive of 1998 EU Internet Privacy Law of 2002 (DIRECTIVE 2002/58/EC) With a discussion here. Finland: Act on the Amedment of the Personal Data Act (986) 2000. France: Data Protection Act of 1978 (revised in 2004)
  • 33. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Germany: Federal Data Protection Act of 2001 Greece: Law No.2472 on the Protection of Individuals with Regard to the Processing of Personal Data, April 1997. Guernsey: Data Protection (Bailiwick of Guernsey) Law of 2001 Hong Kong: Personal Data Ordinance (The "Ordinance") Hungary: Act LXIII of 1992 on the Protection of Personal Data and the Publicity of Data of Public Interests (excerpts in English). Iceland: Act of Protection of Individual; Processing Personal Data (Jan 2000) Ireland: Data Protection (Amendment) Act, Number 6 of 2003 India: Information Technology Act of 2000 Italy: Data Protection Code of 2003 Italy: Processing of Personal Data Act, January 1997 Japan: Personal Information Protection Law (Act) (Official English Translation) Law Summary from Jonesday Publishing Japan: Law for the Protection of Computer Processed Data Held by Administrative Organs, December 1988.
  • 34. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Korea - Act on Personal Information Protection of Public Agencies Act on Information and Communication Network Usage Latvia: Personal Data Protection Law, March 23, 2000. Lithuania: Law on Legal Protection of Personal Data (June 1996) Luxembourg: Law of 2 August 2002 on the Protection of Persons with Regard to the Processing of Personal Data. Malaysia - Common Law principle of confidentiality Draft Personal data Protection Bill (Not finalized) Banking and Financial Institutions Act of 1989 privacy provisions. Malta: Data Protection Act (Act XXVI of 2001), Amended March 22, 2002, November 15, 2002 and July 15, 2003 Morroco: Data Protection Act Netherlands: Personal Data Protection Act 2000 New Zealand: Privacy Act, May 1993; Privacy Amendment Act, 1993; Privacy Amendment Act, 1994 Norway: Personal Data Act (April 2000) - Act of 14 April 2000 No. 31 Relating to the Processing of Personal Data (Personal Data Act) Philippines: No general data protection law, but there is a recognized right of privacy in civil law.
  • 35. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Romania: Law No. 677/2001 for the Protection of Persons concerning the Processing of Personal Data and the Free Circulation of Such Data Poland: Act of the Protection of Personal Data (August 1997) Portugal: Act on the Protection of Personal Data (Law 67/98 of 26 October) Singapore - The E-commerce Code for the Protection of Personal Information and Communications of Consumers of Internet Commerce. Other related Singapore Laws and E-commerce Laws . Slovak Republic: Act No. 428 of 3 July 2002 on Personal Data Protection. Slovenia: Personal Data Protection Act , RS No. 55/99. South Korea: The Act on Promotion of Information and Communications Network Utilization and Data Protection of 2000 Spain: ORGANIC LAW 15/1999 of 13 December on the Protection of Personal Data
  • 36. US and International Privacy Laws The following list contains a number of international privacy related laws by country and region. Spain: ORGANIC LAW 15/1999 of 13 December on the Protection of Personal Data Switzerland: The Federal Law on Data Protection of 1992 Sweden: Personal Data Protection Act (1998:204), October 24, 1998 Taiwan: Computer Processed Personal data Protection Law - applies only to public institutions. Thailand: Official Information Act (1997) for state agencies. ( Personal data Protection bill under consideration.) United Kingdom: UK Data Protection Act 1998 Privacy and Electronic Communications (EC Directive) Regulations 2003 official text, and a consumer oriented site at the Information Commissioner's Office. Vietnam: The Law on Electronic Transactions 2008
  • 37. You’ve been watching:The Business Case for Document Integrity Connect with us on Twitter Facebook LinkedIn Visit about.me/CrawfordTechInc now