Need of Document Management System (DMS)

Document Management or Enterprise Information Management is perhaps one of the most important of the enterprise solutions that will provide a solution to the various requirements of SOX. Several sections of SOX have a direct bearing on the manner in which the digital documents/records of the enterprise are created, reviewed, approved, stored, retrieved, transferred, and destroyed.

Knowledge Management: Document & Records Management

Estimates have been made calculating that a significantly large proportion (some say, more than 70%) of the documents owned by an enterprise are in digital format and might never be seen in hardcopy.

According to Gartner's Editor in Chief James Lundy: Records management will become a top 10 issue for many CIOs in the coming year.

In the following, we will discuss the various sections of SOX that a document management solution might help in complying with.

SOX Sections:

Section 302: According to Section 302, the CEO and CFO have to personally certify the financial statements and disclosures made by the company on authenticity and accuracy. This requires a system in place that will make the CEO and the CFO confident that all the disclosures that the company makes are accurate and authentic. This can be done in two ways:

One is to trickle-down the responsibility of the CEO and the CFO to the lower management levels and in response bubble-up the sign-offs from the lower management levels on all documents that are inputs to the company filings.

Second is to design comprehensive business processes that produce the company filings. The business processes will be designed in a very rigorous manner to comply with all the provisions and proper implementation and training of all the personnel related to the business processes will be carried out and tested on a periodic basis. Further, the business processes themselves will be open to stringent internal audits that will be carried out from time to time.

One, or a combination of both these practices will go a long way towards ensuring proper compliance.

For both these options it is clear that a strong enterprise-wide document management system will provide the foundation on which the compliance will actually be carried out. In the first case, the sign-offs can be configured using a workflow module of the document management system. In the second case, the business process itself will be configured in the document management system and all the relevant supporting or input documents too will be part of the DMS and appropriate subordination and linking will be done between the official company filings and all the input documents to it.

As proof of the records supporting the final company financials-as filed or reported-it is important to archive all the emails, excel sheets, instant messages or other communications and documents that were exchanged which led to a final certified filing by the CEO and CFO. This will safeguard the CxO's claim that all the financial reports are true to their knowledge and due diligence was carried out before certifying the reports.

Section 404: The CEO and CFO need to provide a report assessing and certifying that the "internal controls" have been assessed and are working fine or that there are weaknesses and appropriate action is being taken. Complying with this requirement is one of the most difficult parts of SOX and requires a whole slew of people, processes and technologies. However, DMS has an important role to play in this.

All the emails and attached documents in the chronological sequence will need to be archived for the purpose of proving that the internal controls are appropriate. Ideally, a workflow module will provide added assurance that the internal controls are implemented.

Section 103: requires storing the documents for a period of 7 years for audit companies. The company being audited would naturally want to replicate the documentation to guard against any discrepancy or miscommunication or mismanagement. Also another part of the act requires

Section 409: requires near-real-time reporting of all material events-whether internal or external to the investors and the regulatory bodies. This can be accomplished by using a single enterprise-wide document management system with appropriate "alerts" and notifications and workflow configured according to the design of the compliance-based business processes. This system would make sure that all relevant information is immediately relayed to the top management (CEO and CFO) and the compliance committee and advisors with minimum delays and latency. DMS provides appropriate capabilities to the compliance advisors to provide a recommendation (within the stipulated time frame) linked to each alert and escalate the reports to the CxOs with the appropriate recommendations. The CxOs can then decide whether it merits disclosure under the compliance act based on recommendations of their Compliance Committee or Advisors.

Section 802: provides for criminal penlties for knowingly altering, destroying, concealing and other activities, such as introducing false records, related to impeding or influencing an ongoing or potentially upcoming investigation by a federal agency. This would call for holding all documents in a secure system where absolutely no one in the company can alter them once they are finalized. Also this calls for a formal document retention and destruction policy which is strictly adhered to (in fact, can be proven to be adhered to) and which involves making sure that no document which any investigating agency would require is being destroyed or deleted. Furhter, the act requires that as soon as the company comes to know about a potential investigation all documents pertaining or somehow germane to that investigation are immediately ordered indestructible to or unalterable by anyone-including the CxOs of the company. This makes it important to have a feature related to creat!

ing and accepting "alerts" from the legal department of the company about any ongoing or upcoming potential investigations and as a consequence immediate information "vaulting" of all related documents. This feature will ensure compliance with this particular section and save a potential prison term and a large monetary fine and of course loss of credibility.

This section has a strong bearing on a records or document management policy of a company. The company should develop a proper document management policy and adhere to it in a timely and rigorous manner. If this is not done, the company is exposed to severe costs and damage in terms of providing documents to hostile parties in "pre-trial discovery"-the legal process of providing all relevant documents to the opposing party in a legal suit. It also exposes the company to accusations of hiding or destroying relevant documents-if done at a later stage-even before any legal proceedings are begun against the company-a la Arthur Andersen's Enron-related documents.

Document Management systems provide several benefits to the company. Since an IT system is a business process frozen in a particular software and hardware implementation, it proves that the particular business process is being consciously and diligently adhered to. In the worst case, this proves that the compliance is being followed in spirit. Now whether the compliance is being followed in form can be found out from the results of the particular system and also from the audits of it at various stages of the business process. The capability to follow an audit trail on all documents created or processed through it is extremely useful in executing compliance activities and also in proving compliance at a later stage. The capability to create workflows automatically creates auditable process paths.

The DMS also makes possible to access any documents at any point of time with relative ease. It also acts as a centralized repository of documents (both structured and unstructured). All publicly disclosed documents can be locked in the final form as images and can not be tampered with later on. These can be stored and deleted according to the schedules of various regulatory and compliance Acts of the Government. Document and information which is supposed to be for limited consumption at the top management level can also be strictly screened and internal controls on these can be enforced rigorously. At the appropriate time the documents can be "published".

Whistleblower: For this section of the act, it is important that a document management system is provided to log all whistleblower communication-absolutely securely where no unauthorized personnel may be able to access it-and store all communications.

An indirect requirement for Document Management Systems in the enterprise is for the purpose of storing the documents related to enterprise compliance policies, their updates, amendments, the internal control policies of the company and other documents of a similar nature that help in proving the compliance process at the enterprise.

The company needs to make policies about the following aspects of documents:

  • Creation
  • Approvals
  • Publishing
  • Retention
  • Access
  • Distribution
  • Lifecycle

This policy will help in implementing the contradictory requirements of document retention for compliance purposes and document deletion for reducing the cost of document retention and improving operational efficiency.

Initial step is to define the document retention policy. The second step is to survey the existing document management systems in place in the enterprise and the third step is to create a proper document management system.

Have a centralized repository of documents.

Have a structured and hierarchical architecture

Have security & access control

*A Report Distribution System or Document Management & Workflow System will disburse this to the CEO and the CFO within the prescribed time-frame and allow them enough time to make their own final judgments about the situation.

Finally, a Public Information Distribution System should exist to quickly disburse this information-if judged important by the CEO & the CFO-to the investors & other stakeholders or relevant authorities prescribed by SOX.

Author: Dr. Vikas V. Gupta.

Email: ceo@inkorus.com

ceo@inkorus.com

www.istrat.co.in
www.gemolap.com
www.internetsrus.com
www.real-estate-web-software.com

About The Author

Dr. Gupta is the Founder & President of Istrat. He is a B.Tech. from IIT, Bombay & did his M.S.(Engineering) & Doctorate in Engineering Science (Ph.D.) from Columbia Univ., New York. Following his doctorate he has worked at University of California, Irvine as a Research Scientist and as an Asst. Prof. at IIT Kharagpur.

He is responsible for setting the strategy and direction of the company and looks after the strategy and execution of the strategy. He provides a global perspective to the company and provides a bridge between Indian IT resources, including talent and products, and global clients with IT requirements. He provides the Indian IT talent with an understanding of the parameters important to the global client (namely, quality, reliability and delivery, besides cost). Similarly he provides the global clients with an understanding of the breadth & depth of expertise of the Indian IT workforce (namely, Architecture & Design expertise, product development & project management expertise and functional expertise of business processes of various industry sectors, besides low cost programming talent).

Batchtown Chicago prom limo .. Lockport Chicago limo O’Hare
In The News:

A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.
Tech expert Kurt “CyberGuy" Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy.
Beware of these six sneaky holiday scams. Tech expert Kurt “CyberGuy" Knutsson gives you tips to avoid falling victim.
Tech expert Kurt “CyberGuy" Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data.
Artificial intelligence is making life easier for cybercriminals, allowing them to create elaborate scams to trick people. Kurt the Cyberguy explains how to protect yourself.
Cut through all the digital clutter and delete multiple emails from your Android simultaneously. Kurt the CyberGuy explains how it's done.
Tips to prevent your holiday decorations from being stolen
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson lays out the immediate steps you should take if your phone has been hacked and your personal information becomes vulnerable.
Fraudsters are sending people bogus invoices through PayPal as part of a sneaky scam that is going around; here's how to protect yourself from being fooled.
A former Colgate-Palmolive employee was shocked to discover $750,000 had been drained from her 401(k) account. "CyberGuy" offers tips on how to prevent identity theft.
Electric vehicle maker Harbinger recently showed its electric delivery truck can handle icy roads with agility and stability in winter.
To make the busiest time of year more manageable, here are some tricks for tracking your packages, taking quality family photos and curating the perfect Christmas playlist.
Kurt "CyberGuy" Knutsson explains how to keep your online Amazon gift purchases a secret from loved ones or friends this holiday season.

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Software Companies: Generate New Revenue Streams and Decrease Costs with Custom e-Learning Content

It's no secret that software companies operate in a very... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Brand Your Websites URL With a Favicon

Have you ever noticed that when you look at your... Read More

PHP On-The-Fly!

IntroductionPHP can be used for a lot of different things,... Read More

How to Build a Basic CSS Layout

Designing without tables by using CSS layouts is fast becoming... Read More

Microsoft Great Plains - Typical Problems And Fixes ? Overview For IT Administrators

How to delete the user? This is the first problem... Read More

A Simple Guide To Wikis

A wiki is an editable text-based website. But you don't... Read More

FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More

Reloading Windows XP

If you have been running Windows XP for a couple... Read More

A Symons Mark II Function Point Counting Example

I provide, here clear explanations and a count of function... Read More

Microsoft CRM Implementation ? Fundamental CRM Principles Revision

Microsoft CRM is relatively new player on the now becoming... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More

15 Questions to Ask Your Software Vendor

When making a decision to buy any piece of software... Read More

A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

Icons are used everywhere; right from software applications, to internet... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java

Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More

New Web-Based HR Tool is Max From NAS, Hannibal, and InfoLink

Three highly respected names in Human Resources have joined forces... Read More

What You Should Know About Installing Screensavers

Do you remember that frustrating feeling when you find an... Read More

shuttle from Midway Munster are ..