Have you ever been uncomfortable with someone potentially looking over your shoulder while you enter your PIN number at a point-of-sale device or ATM? What about having someone see the document you’re working on while on an airplane?
Now do you have documents in your organization being scanned and validated that have sensitive information like credit card numbers, social security numbers, financial data, or health-related data? Ever wonder how you can extract that data automatically and validate it without having anyone potentially misuse it? And when thinking about the staff responsible for validation, do you want them to see all of the data on a document?
Now relax, there are solutions out there that will help you sleep better at night. While many document capture solutions can automated the extraction and validation of data, most present the entire document for validation. But a new breed of capture applications let you “burst apart” that data and send it to different people for validation. Doing so allows you to keep the sensitive data separate and route it to specific individuals for validation.
It also allows you to have “security through obfuscation” by preventing any single person from accessing an entire document or file’s data. An example would be a patient chart that has name, social security number (SSN), address, phone, and health data. In these new systems, you can route the SSN to one person, the name and address to another, and the health data to yet another so no one can put it all back together.
With field-based validation, you can have the ultimate control over how your data quality process works, enjoy maximum efficiency, and be confident that your data is secure.
See how it works: