Security, Audit Trail and Supervision
Cincom ECM allows a security policy to be established in terms of access rights and confidentiality of managed documents.
It is possible to define working areas for each entity of an organisation.
Cincom ECM users are defined in Cincom ECM software.
Access to records and documents are managed with the person’s identity (login / password).
Cincom ECM determines the records, documents and information that the user can view or edit.
The user access can be controlled through a corporate LDAP directory.
Single Sign-On (SSO)
In order to avoid asking the user to authenticate at each connection in Cincom ECM, it is possible to establish Single Sign-On (SSO) management.
Management of File/Document Access Rights
Cincom ECM can define access rights for each file or document including read, add, change, delete and collaboration (review/approval).
Cincom ECM traces all user or system actions including connections, added items, deleted, search, stages of the workflow, versioning and comments.
Cincom ECM can define and apply a watermark using JPEG. This watermark can be created by the administrator at any time and used whenever it is required.