Information & Demo Center    Product Support    Customer Login     Español
  
Enterprise Rights Management Software
Contact Us Send Us An Email Send Us An Email

Financial Services



We live in a world where information on paper is typically replicated digitally so we can instantaneously send it or access it virtually anywhere. While this makes most internal processes, from audit to customer service more efficient, having such easy access to a company's digital assets represents a potentially attractive target for security compromise that can lead to abuse, misuse and even theft.

Today, financial content, customer information and related documents—such as account applications, cleared checks, financial instruments and written trade instructions—are a primary security concern in the financial services industry. As abuses have grown in recent years, lawmakers and regulators have imposed new compliance standards focused on data privacy, availability, integrity and confidentiality.

The Financial Services Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLB) controls the manner in which financial institutions handle customer financial data and the Sarbanes-Oxley Act (SOX) of 2002 and the SEC Rule 17a-4 cover the document, management and retention requirements and defines the record types (both physical and electronic) that corporations must comply with in order to avoid potential criminal investigation and penalties. These are but two of the many regulations that are in effect today and address the issue of privacy, record retention and monitoring.

GigaTrust's Intelligent Rights Management is designed to address the challenges of information control and regulatory compliance faced by the financial industry and:
  • Help you establish rules for controlling sensitive information
  • Protect sensitive files and all forms of business communications: email, attachments, file sharing and even remote mobile access
  • Changes policies so you are in control of who and when content is accessible
  • Report on who has accessed what information and what was done with it