Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.techdata.com Tech Data Confidential & Proprietary Pamela Doyle, Spokesperson, Director, Fujitsu Computer Products Chair, AIIM NA Advisory Trade Member.

Similar presentations


Presentation on theme: "Www.techdata.com Tech Data Confidential & Proprietary Pamela Doyle, Spokesperson, Director, Fujitsu Computer Products Chair, AIIM NA Advisory Trade Member."— Presentation transcript:

1 www.techdata.com Tech Data Confidential & Proprietary Pamela Doyle, Spokesperson, Director, Fujitsu Computer Products Chair, AIIM NA Advisory Trade Member Board,The TWAIN Working Group, and CDIA+ “Document Imaging (ECM), The Case for Information Management Compliance”

2 Tech Data Confidential & Proprietary 2 1. Trends Driving the Demand 2. The Solution 3. Technology Overview Agenda 4. Case Studies 5. Market Opportunity 6. More Information

3 Tech Data Confidential & Proprietary 3 Trends Driving the Demand for Document Imaging Protect information Streamline business operations Demonstrate regulatory compliance

4 Tech Data Confidential & Proprietary 4 “Many CEOs Take Ebbers’ Crime Personally, want Tough Sentence “Quarttrone Guilty on All 3 Counts” “Martha Behind Bars” “Ignorance is not Bliss for Execs On Trial” “Enron: Portrait of Greed” “CEO of a Public Pharmaceutical Sentenced to 7 Years in Jail and Ordered to Pay $3M for Ordering Destruction of Documents ”

5 Tech Data Confidential & Proprietary 5 U. S. Regulations Government Paper Elimination Act HIPAA Gramm-Leich-Bliley Sarbanes-Oxley Patriot Act Bank Secrecy Act ISO 15489-1 & 15489-2 SEC 17a3-4 Federal Rule of Litigation Discovery DoD 5015.2- STD/DITSCAP Check 21 The Health Care Quality and Modernization, Cost Reduction and Quality Improvement Act The Rehabilitation Act – Section 508

6 Tech Data Confidential & Proprietary 6 Define Best Practices for Data Management & Security Central to regulations are: –Accessibility, –Privacy, and –Protection of data.

7 Tech Data Confidential & Proprietary 7 The Solution Enterprise Content Management, including document imaging, the capture component, as it provides real world solutions that enable organizations to manage information more efficiently, to streamline business operations and to ensure the physical protection of their data.

8 Tech Data Confidential & Proprietary 8 Enterprise Content Management “Capture, manage, store, preserve and deliver information and documents related to business and organizational processes.” AIIM International, 2005

9 Tech Data Confidential & Proprietary 9 The Content Management Crisis Unstructured content is growing at 92% CAGR (Enterprise Storage Group) Typical office worker spends 40% of time looking for information Professionals spend over 500 hrs. annually reviewing and routing files Another 150 looking for incorrectly filed documents

10 Tech Data Confidential & Proprietary 10 Content Exists in Numerous Formats Graphics Electronic Sound Video Web Content Fax Email Paper

11 Tech Data Confidential & Proprietary 11 Facts about FAX Many businesses still rely heavily on fax Many P.O. systems, invoicing systems and mortgage processing are still driven by fax Manually faxing documents takes an average of 8 minutes and greatly consumes resources Considering an average labor cost of $20, can help estimate labor cost using the manual method Scanning and distributing electronically can reduce the time to less than 30 seconds

12 Tech Data Confidential & Proprietary 12 Facts about Electronic Mail AIIM Industry Watch Users spend 30% of their time in email 70% of users use email to negotiate contracts and agreements 84% use email to discuss operational or product strategies 63% use email to discuss sensitive HR issues Only 45% of user have a formal policy for email retention

13 Tech Data Confidential & Proprietary 13 Facts about Paper Stacking UP, by Daniel Gross (U.S. Airways Attache, May ‘2005): –PCs Chew up some 115 billion sheets of paper each year –In 2003, U.S. office worker used more than 10,000 sheets Average organization (Pricewaterhouse Coopers Study): –Makes 19 copies of each document –Spends $20 in labor to file each document –Spends $120 in labor searching for each misfiled document –Loses 1 out of every 20 documents –Spends 25 hours recreating each lost document –Spends 400 hours per year searching for lost files

14 Tech Data Confidential & Proprietary 14 Capture images Retain as image or extract data Create metadata Manage the data Secure the data (store CDs, WORM, MO) Protect off-site (the more redundancy the better) Convert Paper to Electronic Format

15 Tech Data Confidential & Proprietary 15 Software Archive and Retrieval Production Capture OCR ICR/OMR/Barcode Forms Processing Fax Management Document Distribution Key from Image eMail Management Business Process Management (Workflow) Image Enable Enterprise Report Mgmt. Information Management Compliance Information Lifecycle Management

16 Tech Data Confidential & Proprietary 16 Hardware Network Infrastructure Scanner(s) Image Processing Image Enhancement Collaboration Tools Security Storage: –Magneto Optical –WORM –RAID –CDs –NAS –SAN

17 Tech Data Confidential & Proprietary 17 Recent Industry Trends Internet Distributed Capture Image Processing Color Increase in the Number of Service Bureaus Adoption of ASPs

18 Tech Data Confidential & Proprietary 18 Technology and Compliance Technologies can aide Challenge is to develop, implement and review compliance strategies and policies First step is to become knowledgeable Apply technology, processes, cultural change and employee education to make the changes to demonstrate regulatory compliance Technology can provide the infrastructure

19 Tech Data Confidential & Proprietary 19 Aiding in Regulatory Compliance Convert Paper to Electronic Format OCR/ICR/Barcode Metadata Full Text Search and Retrieval Zoom Author Check-In/Out Privileges Version Control Remote Access Simultaneous Access Designated privacy administrator Access Control Audit Trail BPM (Workflow) Redundant Off Site Storage

20 Tech Data Confidential & Proprietary 20 Other Document Imaging Applications Horizontal Applications: –Disaster recovery –Regulatory compliance –Customer records management –Human resource records management –Processing forms –Document distribution –Document publication –Automating business processes

21 Tech Data Confidential & Proprietary 21 Other Document Imaging Applications Education: –Student Records Medical: –Patient Records –Claim Processing –Order Entry (Lab, etc.) –Clinical Data Repositories Transportation: –Proof of Delivery Legal: –Client Records –Case Reports Government: –Historical Records –Parking Tickets –Compliance Documents –Police Department Records

22 Tech Data Confidential & Proprietary 22 Other Document Imaging Applications Insurance: –Applications –Claims –Damage Inspections Hospitality: –Charge Authorizations –Reservations Retail/Manufacturing: –PCard/TCard Receipts –Contracts –Buyer Files –Sales Agreements Banking/Financial Services: –Proof of Deposit –Check Truncation –Signature Verification –New Account ID –Transaction Processing –Safe Deposit Contracts –Wire Transfer Documentation

23 Implementation Recommendations Identify Document Intensive Business Problem Board Commitment RFP Get Educated Leverage Infrastructure Training Installation Retain Services Of VAR/SI

24 Tech Data Confidential & Proprietary 24 Considerations Backfile versus day forward implementation Internal implementation versus using a third party (clear understanding of charge model) Centralized versus decentralized Shred versus off-site storage

25 Tech Data Confidential & Proprietary 25 Myths File formats Storage media longevity Data recognition accuracy Can be submitted in a court of law Eliminate paper

26 Tech Data Confidential & Proprietary 26 Realities Cut costs Broaden market outreach Increase document management efficiencies Maintain accurate audit trail Ensure regulatory compliance Accelerate business processes Reduce storage costs Protect data and ensure business continuity

27 Tech Data Confidential & Proprietary 27 Pharmaceutical Major pharmaceutical company that researches, develops, manufactures and markets drugs for prevalent medical conditions Business problem: –Inundated with files and the paper intensive process required by the FDA to track a drug from research to market –Subject to unexpected inspections (must produce on demand) –Needed business continuity plan

28 Tech Data Confidential & Proprietary 28 Pharmaceutical Solution: –Archive and Retrieval –Production Capture –OCR/ICR –LVP scanners (6) –MVP scanners (2) ROI: –Increased efficiency by 18% –Cost savings ($.10 to copy/$.06 to image) –Decreased staff by 2 people (40K+) –Ensure protection of data

29 Tech Data Confidential & Proprietary 29 Manufacturer Paper and Lumber Manufacturer Business Problem Too many man hours spent filing and retrieving 2M documents yearly Physical space to store was becoming excessive Needed a disaster recovery plan for critical information asset Solution Capture Software and LVP Scanner

30 Tech Data Confidential & Proprietary 30 ROI Processing time reduced from 17-20 minutes to 20 seconds Reduced storage costs Accelerated business process by enabling customers to have direct access to documents Ensured security of data from any data storage disaster Manufacturer

31 Tech Data Confidential & Proprietary 31 Hospital Referral hospital (421 beds; 1,600 staff) Problem: –Turnaround time for trauma patients was too long due to inability to find files quickly (250 boxes in hall with 3,000 documents) –HIPAA Solution: Scan to CD 4 MVP scanners

32 Tech Data Confidential & Proprietary 32 Hospital ROI: –Faster patient response (10 min. vs. < 3 min.) –Reduced storage (elim. storing 150,000 docs. monthly) –Cost savings ($500K per year) –Faster retrieval and processing for HIPAA compliance

33 Tech Data Confidential & Proprietary 33 Compliance: An Imaging VAR’s Secret Weapon (Business Solutions, May 2005, By Ken Congdon) ECS Imaging, Riverside, CA “Individual regulations have their own stipulations but all center around the management, maintenance, and retention of records” “Imaging technologies help protect against failure costs by providing an electronic platform where records can be quickly accessed” “Traditionally, businesses base their decisions to implement on ROI or payback…However, in compliance TCF (total cost of failure) can be more influential in closing a technology sale “ECS increased sales 26% by showing clients how imaging can help them meet regulatory requirements”

34 Tech Data Confidential & Proprietary 34 Overall Market Potential Enterprise Content Management is a $3 billion dollar market (AIIM International based on Gartner Study) Total market opportunity created by compliance will reach $80 billion over the next 5 years (AMR Research)

35 Tech Data Confidential & Proprietary 35 Scanner Market Categories InfoTrends

36 Tech Data Confidential & Proprietary 36 Workgroup Market Share – CY ‘04 fi-4120C / fi-4220C *Estimated Source: InfoTrends

37 Tech Data Confidential & Proprietary 37 Departmental Market Share CY ‘04 *Estimated Source: InfoTrends fi-4530C

38 Tech Data Confidential & Proprietary 38 LV Production Market Share CY ‘04 *Estimated Source: InfoTrends fi-5750C

39 Tech Data Confidential & Proprietary 39 MV Production Market Share CY ‘04 *Estimated Source: InfoTrends fi-4860C

40 Tech Data Confidential & Proprietary 40 More Information Industry Associations: –AIIM www.aiim.orgwww.aiim.org Annual trade show Local chapters Certifications MarketPlace –ARMA www.arma.orgwww.arma.org Annual trade show Local chapters –CompTIA (www.comptia.org) CDIA+ Periodicals (DIR; eDoc; DOC1; & Business Solutions) Tech Data VPRs


Download ppt "Www.techdata.com Tech Data Confidential & Proprietary Pamela Doyle, Spokesperson, Director, Fujitsu Computer Products Chair, AIIM NA Advisory Trade Member."

Similar presentations


Ads by Google