Securing networked multifunction devices in government.

Similar documents
Document Imaging Solutions. The secure exchange of protected health information.

U.S. Army best practices for secure network printing, scanning, and faxing.

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

FileCloud Security FAQ

The Impact of HIPAA and HITECH

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Sharpen your document and data security HP Security solutions for imaging and printing

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Samsung Security Solutions

HIPAA and HITECH Compliance for Cloud Applications

Protecting Data-at-Rest with SecureZIP for DLP

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)

Office of Inspector General

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Ensuring the security of your mobile business intelligence

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE

Securing MFPs in a CAC Environment: Today and Tomorrow Critical Considerations

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

DRAFT Standard Statement Encryption

Addressing document imaging security issues

Healthcare Compliance Solutions

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Securing and protecting the organization s most sensitive data

Projectplace: A Secure Project Collaboration Solution

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

GFI White Paper: GFI FaxMaker and HIPAA compliance

M E M O R A N D U M. Definitions

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

How To Manage Security On A Networked Computer System

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Security Solutions. Concerned about information security? You should be!

Supporting FISMA and NIST SP with Secure Managed File Transfer

WHITE PAPER Usher Mobile Identity Platform

IBM Client Security Solutions. Client Security User's Guide

IBM Security Privileged Identity Manager helps prevent insider threats

Federal Trade Commission Privacy Impact Assessment

Secure Gateway (EMSG)

Securing Data on Portable Media.

Did you know your security solution can help with PCI compliance too?

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Workflow Suite Family. GlobalScan. Capture & Distribution Solution Comprehensive Document Control. scalable. ersatile. powerful

BANKING SECURITY and COMPLIANCE

Office of Inspector General

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Guideline on Auditing and Log Management

GlobalScan. Capture, process and distribute documents with exceptional efficiency. Workflow Suite Family

PRIVACY IMPACT ASSESSMENT

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

HIPAA Compliance Review Analysis and Summary of Results

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

IMAGER security solutions. Protect Your Business with Sharp s Comprehensive Document Security Solutions

Solving the problem of paper in mortgage loan origination.

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

Data Classification Technical Assessment

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Security. Titus White Paper

Control scanning, printing and copying effectively with uniflow Version 5. you can

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

HIPAA COMPLIANCE AND

Compliance in 5 Steps

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Sync Security and Privacy Brief

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Research Information Security Guideline

MySQL Security: Best Practices

Privacy + Security + Integrity

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

ADVANCED SOLUTIONS FOR. Healthcare. patient safety quality of care Meaningful Use unstructured documents

SecureAge SecureDs Data Breach Prevention Solution

Security Compliance, Vendor Questions, a Word on Encryption

Transcription:

Securing networked multifunction devices in government. Nine recommendations for addressing security vulnerabilities in network printing, scanning and faxing.

2 Table of contents Introduction...3 On the cost and prevalence of data breaches...4 Multifunction devices pose a threat...4 Implementing a secure multifunction device environment...4 Recommendation 1: Require user authentication...5 Recommendation 2: Restrict access based on user authorization...5 Recommendation 3: Centrally audit all network activity...6 Recommendation 4: Encrypt data to/from MFDs...7 Recommendation 5: Implement pull printing...7 Recommendation 6: Implement rules-based printing...8 Recommendation 7: Enforce trusted network destinations...8 Recommendation 8: Monitor and control PII activity...9 Recommendation 9: Standardize and integrate network scanning...9 Conclusion...10 Appendix A: Nuance Product Certifications... 11

3 Introduction This white paper provides information on security vulnerabilities associated with networked multifunction devices (MFDs) and nine specific recommendations on how to address these threats. Here are the nine recommendations. Standardize & Integrate Network Scanning

4 On the cost and prevalence of data breaches. The U.S. Government Accountability Office (GAO) defines data breach as the unauthorized or unintentional exposure, disclosure, or loss of information 1. The cost and impact of data breaches have been extensively researched in recent years, and the results demand that organizations take action. In May 2014, the Ponemon Institute and IBM released their ninth annual benchmark study on the cost of data breach incidents, 2014 Cost of Data Breach Study: United States. Their research concluded the following points: The average organizational cost of a data breach is $5.4 million The average cost per record of a data breach is $201, and Both malicious attacks and negligence were responsible for data breaches 2 Unfortunately, data breach incidents are a common occurrence, and are on the rise. In its April 2014 report, Information Security: Federal Agencies Need to Enhance Responses to Data Breaches, GAO stated that the number of data breach incidents in federal agencies had doubled between 2009 and 2013, to 25,566 per year 3. The U.S. Department of Health and Human Services (HHS) reports that more than 26 million individuals have been impacted by data breaches since 2009 4. Here is one example of the financial impact: in 2011, a security breach within TRICARE, the U.S. Department of Defense (DOD) healthcare program, impacted 4.9 million individuals and resulted in a class action lawsuit of $4.9 billion dollars 5. Multifunction devices pose a threat. In its report Copier Data Security: A Guide for Businesses, the U.S. Federal Trade Commission (FTC) makes a succinct statement: Digital copiers are computers. As such, the report goes on to recommend that organizations should incorporate these devices into their information security plans. Digital copiers, also known as multifunction devices (office machines that have the ability to print, scan, copy and fax), have hard drives, embedded firmware, and the ability to communicate with other systems on the network. They are susceptible to the same security vulnerabilities that a computer is. Therefore, without the proper security measures in place, the multifunction device (MFD) poses a significant risk of sensitive information exposure. Networked MFDs are now commonplace in the workplace environment, with office workers using them daily to print, scan, and fax documents over the network, and in many instances these documents contain sensitive information. To prevent damaging data breaches, an organization must control and protect both the physical and electronic access points on their MFDs. The following section outlines 10 specific recommendations that organizations must consider to enable a more secure MFD, based on common scenarios that exist in most environments. Implementing a secure multifunction device environment Every time a document or form is copied, scanned, printed, faxed or emailed on either an analog fax machine, digital multifunction device (MFD) or mobile phone or tablet personally identifiable information (PII) can be accidentally exposed or intentionally compromised. Paper output can be particularly difficult to track and control, and is not completely eliminated by electronic processes. $5.4M Avg. organizational cost of a data breach 25,566 Number of data breach incidents in U.S. federal agencies in 2013 What is a data breach? Unauthorized or unintentional exposure, disclosure, or loss of information. 1 http://www.gao.gov/assets/660/659572.pdf 2 2014 Cost of Data Breach Study: United States, Ponemon Institute & IBM, May 2014 3 http://gao.gov/assets/670/662227.pdf 4 http://www.hhs.gov/ocr/privacy/hipaa/ administrative/breachnotificationrule/ breachtool.html 5 http://www.inforisktoday.com/tricare-breachaffects-49-million-a-4105/op-1

5 Nuance, a leading provider of secure information capture and output management solutions, has developed a software platform that many government organizations use today to secure their MFD environment. Nuance Document Government Solution (NDGS) suite consists of mature Commercial Off-The- Shelf (COTS) products including document capture, print management and mobile software applications. As a single integrated package, these applications provide a centrally-managed secure MFD capture & print solution. Recommendation 1: Require user authentication. Authentication enables the auditing, reporting and tracking of user activity as well as various other security features. There is no MFD more unsecure than one that allows anonymous usage; such devices are susceptible to various forms of abuse and can make tracing the source of a data breach or leak virtually impossible. As a general rule, some form of authentication is recommended over none. Whether via direct Active Directory logon or through a smart card such as Military Common Access Cards (CAC) or Personal Identity Verification (PIV) cards, it is critical to restrict MFP usage through authentication, allowing only authorized staff to access specific devices, network applications and resources. In addition to the improved security, regulatory compliance can be supported through the implementation of MFD authentication. For U.S. federal agencies, authentication with government-issued CAC or PIV cards supports compliance with Homeland Security Presidential Directive 12 (HSPD-12) by requiring two-factor authentication to access network data (in this case documents sent to and from a network MFD). NDGS supports various forms of authentication. However, single sign on capability via CAC/PIV card using two-factor authentication is the preferred method whenever possible. As alternatives, both Windows NTLM and Active Directory are supported. In the cases where the user environment doesn t allow for those forms of authentication, the solution also supports HID and proximity based technologies and custom authentication via simpler methods such as the use of a PIN. Recommendation 2: Restrict access based on user authorization. MFDs should support the restriction of features and capabilities of an authenticated user based on Windows group membership 6. This is important from a central management security perspective and enables the MFD to restrict access to functions per security group membership basis. Just because a user has authenticated into the system, doesn t mean they should have access to every function. At the MFDs, restricting access ensures that users only have access to those resources on the network that they normally do. Just as a user might not have access to a particular network share as defined by a Windows Access Control List (ACL) 7, they would not be able to scan a document to that location either. Likewise, if a user does not have access to a particular library in SharePoint, the solution denies document scanning access to that library. Nuance Document Government Solutions (NDGS) consist of a mature Commercial Off-The-Shelf (COTS) product suite consisting of capture, print management and mobile software applications. As a single integrated package, these applications provide a centrally-managed secure MFD capture and print solution. Network authentication is seamlessly integrated with the document workflow and to ensure optimal auditing and security, documents containing sensitive information are captured and routed to various destinations such as email, folders, fax and line of business applications. 6 Windows Active Directory group definitions: https://msdn.microsoft.com/en-us/library/ windows/desktop/ms676913.aspx 7 Windows Access Control Lists definition: https://msdn.microsoft.com/en-us/library/ windows/desktop/aa374872.aspx

6 NDGS provides the ability to restrict document scanning based on Active Directory group membership, enabling granulized access. Network authentication is seamlessly integrated with the document workflow. Once users are authenticated, the solution controls what they can and cannot do. It enables or restricts scanning and faxing to particular destinations, and prohibits documents with sensitive information from being printed, faxed or scanned, all based on the rights of the user. NDGS increases employee acceptance of MFD scanning and reduces the need for them to find workarounds that bypass security measures. Consider the common action of scanning a document and emailing it to oneself as a simple way to work with it electronically. In a non-compliant workflow, a worker might authenticate at the MFD, select scan as a function and enter their own email address as the destination. Besides requiring upwards of 30 keystrokes, this process is not compliant if the document or sending device are identified by a generic descriptor BrandNamePrinterScan001.pdf, for example or the action is not captured in an audit log. NDGS can make this activity as easy as tap and go. A user walks up to the device, signs in with their CAC or PIV card and then chooses Scan to my email from a list of pre-defined and pre-authorized workflows displayed on the MFD s control panel. It s a faster, simpler, error-free process and with the activity audited as to user, device, action, email address, date and time and document metadata. Recommendation 3: Centrally audit all network activity. Auditing allows the MFD to capture tracking information. However, without a centralized mechanism in place, tracking is store disparately: copier-by-copier and printer-by-printer. With NDGS, all audit data is captured and stored centrally. In the event of a data breach, NDGS helps you easily track down which device was the source of the breach, and can tell you who the authenticated user was and where the data was sent. By enabling auditing, NDGS records all metadata passed through the system. Auditing enables you to track down a specific event, such a scan or print by a specific user. You can also produce reports that provide an overview of scanning activity by device or department. The solution can store all tracking data via SQL database, including the warehousing of all printed, scanned, and faxed (when using a network fax server) images by retention period. Compliance security standards require most businesses to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. By building an audit trail of all copy, print, scan, email and fax activity at every networked MFD, including paths to document images, using the right kind of advanced capture and output solution will bring use of these devices into compliance. Just as important, reviewing the audit log helps organization s to identify a breach, take prompt corrective action, issue the necessary notifications and avoid the cost of fines. In the case of healthcare agencies for example, correcting a violation within 30 days of acquiring actual or constructive knowledge of it provides an affirmative defense and immunity against HIPAA s civil monetary penalties 8. Compliance security standards require most businesses to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. By building an audit trail of all copy, print, scan, email and fax activity at every networked MFD, including paths to document images, using the right kind of advanced capture and output solution will bring use of these devices into compliance. 8 Department of Health and Human Services, Administrative Data Standards and Related Requirements, 42 U.S.C. 1320d-6

7 Recommendation 4: Encrypt data to/from MFDs. In order to ensure data security, all data transmitted to and from an MFD should be encrypted. Furthermore, government organizations must leverage encryption technology that meets specific security guidelines. meet the security requirements for cryptographic modules defined by Federal Information Processing Standard Publication 140-2 (FIPS PUB 140-2) by leveraging specific accredited encryption methods for both Data in Motion and Data at Rest. Data in Motion applies to communication between MFDs and the Nuance software application. Data in Motion is transferred over Secure Sockets Layer (SSL) with up to 2048-bit encryption. Supported MFDs can utilize FIPS 140-2 accredited Open SSL FIPS Object Modules 9. Data at Rest applies to print jobs held in the solution s print queue and scan jobs held in the solution s temporary working files. Encryption is enabled directly on the Windows Operating System and not within the Nuance software application. Data at Rest is stored using up to dual layer data encryption utilizing two Windows operating system encryption methods: Windows Encrypting File System (NT File System) and BitLocker Drive Fullvolume Encryption (Whole Disk). Both methods rely on FIPS 140-2 validated cryptographic libraries 10. In addition to encryption considerations, modern MFDs often contain hard drives which are used to cache scanned document images and printed documents. As a result, all non-volatile memory media used to cache data on the device should employ a method of data erasure to protect data in accordance with NIST Special Publication 800-88. Recommendation 5: Implement pull printing. In order to avoid exposing documents with PII when printed, secure printing requires that users authenticate at the device before documents are released. The device must print only those documents that are associated with the authenticated user, and the print job must not be stored on the device prior to printing. Documents should be stored on the print server in a pending queue prior to printing where a FIPS PUB 140-2 cryptographic algorithm is utilized to protect the data at rest. During printing, the Internet Printing Protocol (IPP) 11 should be used to transmit print jobs in an encrypted state. There is a high cost associated with handling sensitive data exposure and security breaches. A Department of Veterans Affairs (VA) Office of Inspector General (OIG) in April recorded a common incident that could have been prevented with pull printing: VA OIG reported approximately 8,000 such breaches in calendar year 2013. The VA calculated a cost of $37.50 per individual veteran affected, to cover notification, one year of credit monitoring services and identify theft insurance, and other legal expenses 13. Nuance Document Government Solution suite provides a secure, server-based pull printing capability that enables users to submit print jobs from both Windows and mainframe applications. The solution holds the users queues on a server, as a result users are able to release their print job from any integrated networked MFD/printer. The solution also supports an integrated single sign-on with CAC and PIV cards. Workers can even use a mobile device to activate touch free release of the document. Incident Summary The Privacy Officer (PO) found a patient appointment list in the patient computer lab of the Mental Health Building. The list was printed by My HealtheVet (MHV) staff. While assisting a Veteran with MHV enrollment, the staff member forgot the appointment list in the computer lab. There were 55 patient names on the list. The patient appointment list included the appointment date and time, clinic name, and the patients last name. The PO removed the appointment list and secured it. 12 9 Including AES (Certs. #1884, #2116, #2234, #2342, #2394 and #2484) and RSA (Certs. #960, #1086, #1145, #1205, #1237 and #1273). Reference: NIST, Cert #1747, http://csrc.nist.gov/groups/stm/cmvp/ documents/140-1/140val-all.htm#1747 10 Reference: NIST, Cert #1054, http://csrc. nist.gov/groups/stm/cmvp/documents/140-1/1401val2008.htm#1339 11 IEEE Industry Standard and Technology Organization (ISTO) Printer Working Group (PWG), IPP FAQ, http://www.pwg.org/ipp/ faq.html 12 Monthly Report to Congress of Data Incidents, U.S. Department of Veterans Affairs, Office of Information Security, Risk Management and Incident Response Team, April 2013 13 Courier Services for the Fort Harrison VA Medical Center and surrounding clinics, VA259-14-R-0082, March 2010

8 Administrators can configure queues to automatically delete unprinted jobs after a specified period time. The deleted unprinted jobs are tracked and can be reported on to show cost savings attributable to pull printing and the reduction in total page volume. Recommendation 6: Implement rules-based printing. Rules-based printing controls output by analyzing print jobs before release, based on a set of established rules, to determine how they are printed. Organizations with established print policies, such as the U.S. Army Directive 2013-26 Armywide Management of Printing and Copying Devices or the General Services Administration (GSA) PrintWise program, can enforce these policies with the implementation of rules-based printing functionality. Nuance s print management platform provides a centralized method to build, implement, and control print policy rules to both reduce print costs and increase print security. Print security can be addressed with rules-based printing by controlling who can print what, including when and where they can print. Nuance s rules engine can be configured to restrict printing based on user or group membership, source application, time of day, and destination. A simple example of a rule with multiple logical layers would be, Only allow printing from the personnel/hr system on X devices by users from X Active Directory group, between the hours of 8AM and 6PM, Monday through Friday. Additionally, rules can be defined based on the content of the print jobs, based on analyzing the header data and the actual content of the document. For example, a common fail-safe rule is to disallow printing of any documents stamped with CLASSIFIED on an unclassified network printer. Recommendation 7: Enforce trusted destinations. Once necessary measures have been taken to restrict access to network functions of an MFD through authentication and authorization controls, government organizations must ensure that the devices are configured to properly prevent documents from being scanned or faxed to any destinations that may risk sensitive data exposure. A common high risk scenario is a networked MFD that is configured for scan-to-email and outbound analog faxing without controls in place to validate the email address or fax number of the recipient. NDGS provides the ability to automatically validate a scanned document destination prior to delivery, based on user input information, including selected destinations as well as metadata. Here are three examples: Only allow scanning to in-domain emails: Validate that all outbound scan-to email address recipients end in.gov. Validate a fax number before sending: Check outbound fax number against an approved whitelist of acceptable fax number recipients prior to delivery. Nuance integrates with network fax servers to provide this type of validation. Validate a case number prior to attaching scanned document: When scanning a case file that needs to be attached to a case record, validate case number against database.

9 Recommendation 8: Monitor and control PII activity. Most government organizations have policies in place to protect personally identifiably information (PII) and other sensitive content. For example, the U.S. Department of Homeland Security (DHS) issued its Handbook for Safeguarding Sensitive Personally Identifiable Information in March 2012 outlining mandatory guidelines for all employees to follow to protect PII within and outside of the organization 14. Similarly, the U.S. Navy published a Users Guide to PII containing compliance requirements and protective measures to safeguard U.S. Navy and Marine Corps PII 15. Government organizations should consider implementing software to systematically enforce the PII policies they have enacted. Without a solution in place, organizations must rely on employees manually following protocol, leaving no room for user error. NDGS provides a centralized approach to protecting PII on all documents scanned, faxed, and printed. NDGS monitors documents transmitted to and from MFDs and printers for sensitive data, which can be defined and customized by the application administrator. Nuance s data filtering capability can search documents for security classification keywords (e.g. CONFIDENTIAL) or PII such as social security numbers through regular expression matching. When a sensitive content is identified on a document, the document can be intercepted, quarantined or deleted prior to delivery, and trigger a notification to the user and security officer. Standardize & Integrate Network Scanning Recommendation 9: Standardize & integrate network scanning. One common problem with traditionally configured office MFDs is that no two devices within an organization are setup the same way for document scanning. In a typical scenario, each MFD is manually mapped to a network file share with no standardization throughout the organization. Standardization With NDGS, scanning to network file shares can be enabled and secured uniformly across an entire fleet of MFDs. Administrators can centrally control network folder scanning with a single configuration, with access based on user authentication in the MFD. The following general recommendations should be followed whenever enabling this type of scanning: Avoid allowing users to scan to a high level common shared folder. Not only can these folders become a cluttered dumping ground for various types of materials, they also expose everyone s work to each other. Use NDGS to route documents to the following locations instead: a) The authenticated user s home directory b) A network share protected by ACL with permissions verified by authenticated user Nuance Document Government Solutions (NDGS) automatically enforce security policies by filtering outbound communications and intercepting documents, to proactively prevent PII from leaving the organization and render misdirected or intercepted information unreadable to unauthorized users. 14 Handbook for Safeguarding Sensitive Personally Identifiable Information, U.S. Department of Homeland Security, March 2012, https://www.dhs.gov/sites/default/ files/publications/privacy/guidance/ handbookforsafeguardingsensitivepii_ march_2012_webversion.pdf 15 Department of the Navy (DON) Chief Information Officer (CIO) Users Guide to Personally Identifiable Information, March 2013, http://www.doncio.navy.mil/ ContentView.aspx?ID=4447

10 Integration For additional document security, consider scanning directly into a content management or collaboration system instead of a Windows network folder. These systems typically provide extensive security mechanisms. They often support the consumption of content via SSL web service, and allow for impersonation of an authenticated user so that a service account need not serve as a proxy. NDGS supports integration with all of the major Commercial Off-The-Shelf (COTS) document systems to enable direct and secure scanning. One recommended method with NDGS is to setup a Scan-to-SharePoint scanning workflow. Furthermore, by enabling scanning to authenticated user s SharePoint My Site 16, users will be provided with a secure, single-touch scanning option with easy retrieval. The following general recommendations should be followed whenever enabling this type of scanning: Use NDGS to impersonate the user. This ensures that the user s view of the document system is their own. This is important because document management systems can have complex ACL permission models that are independent of Active Directory. Always use SSL when transmitting documents to a content management system, and ensure that data at rest is protected. Conclusion To prevent damaging data breaches, an organization must control and protect both the physical and electronic access points on their MFDs. The monetary penalties, settlements and costs for failing to safeguard sensitive information are increasing and there are simply too many touch points that create risk in sharing information, most of these involving the technologies that organizations are counting on to run their business especially networked MFDs that copy, print, scan, fax and email. NDGS enables the compliant exchange of sensitive information and PII by adding a layer of security and control to paper-based and electronic processes. Transparently applying automated security techniques that cannot be circumvented, NDGS authenticates users, controls access to workflows, encrypts data, validates network destinations, monitors and controls all documents containing PII and builds and maintains an audit trail of all user activity. As a result, NDGS minimizes the manual work and decisions that introduce human error, mitigates the risk of non-compliance and helps governments organizations avoid the damaging costs of sensitive data exposure. 16 Microsoft Office Introduction to My Site, https://support.office.com/en-au/article/ Introduction-to-My-Site-2f2b071a-1444-4a6fae73-4892b0a55449

11 Appendix A: Nuance product certifications U.S Army Certificate of Networthiness (CoN), U.S. Army Network Enterprise Technology Command (NETCOM), AutoStore, Certificate #: 201315936, CoN Type: Enterprise U.S Navy Authority to Operate (ATO), Program: Enterprise Scan-to-File, NMCI U.S Marine Corps Authority to Operate (ATO), Program: Enterprise Scan-to- File, NMCI U.S. Military Health System (MHS), Office of the Assistant Secretary of the Defense Health Affairs (OASD HA), Program: Healthcare Artifact & Image Management System (HAIMS), Defense Health Clinical Systems (DHCS) U.S. Department of Veterans Affairs, One-VA Technical Reference Model, AutoStore, ID #: 7672, http://www.va.gov/trm/toolpage.asp?tid=7672 U.S Department of Veterans Affairs, One-VA Technical Reference Model, Output Manager, ID #: 7673, http://www.va.gov/trm/toolpage. asp?tid=7673 About Nuance Communications, Inc. Nuance Communications is reinventing the relationship between people and technology. Through its voice and language offerings, the company is creating a more human conversation with the many systems, devices, electronics, apps and services around us. Every day, millions of people and thousands of businesses experience Nuance through intelligent systems that can listen, understand, learn and adapt to your life and your work. For more information, please visit nuance.com. Copyright 2015 Nuance Communications, Inc. All rights reserved. Nuance, and the Nuance logo, are trademarks and/or registered trademarks, of Nuance Communications, Inc. or its affiliates in the United States and/or other countries. All other brand and product names are trademarks or registered trademarks of their respective companies. NDI-12 APR 2015