Resultados de la búsqueda
48 items found for ""
- Contact EN | anteia
Sistema PQR´s (Peticiones, Quejas, Reclamos, Sugerencias) Contact A single supplier One integration One platform anteia is the first platform that hyper-automates linking and sales processes, taking away the headache for companies of dealing with new technologies, integrations, regulations, development team times and unaffordable prices. Give speed and security to your business with anteia's Advanced Digital Identity Fill in the data and start experiencing the hidden power of anteia integration through a lab of our solutions for your company. Access our free FREE IMPLEMENTATION requesting it in this form Nombre Apellidos Empresa Email corporativo Industria Elige una opción Si elegiste otro dinos cual No. Celular Cargo Cuéntanos un poco más... Acepto los términos y condiciones Enviar Thank you. We will be in touch soon.
- SECURSIGN EN | anteia sas
SecurSign Terminología Beneficios Proceso Configuración Casos de uso FAQ Analytics Api Solicita tu DEMO Core ID It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence How does it work? Setting Service Configuration Verification methods Different combinations of verification are offered according to the customer's needs and based on the safety recommendations in international standards. Device ID It is possible to identify information from the device on which the user performs the process, such as the version of the cell phone, the IP, the browser, and other elements to know the behavior of the signers. Visual design Different visual components of the application and other elements of the process can be configured to make the user feel familiar with the application. Among the elements that can be modified are. Logos: Generally at the beginning and at the end of the signature process. Colors: you can choose background colors, also the colors of the main and secondary buttons based on the background colors to improve the contrast. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. api Still missing from the document Solicita tu DEMO
- DECISION ENGINE EN | anteia sas
| anteia Decision Engine Terminología Beneficios Proceso Configuración Casos de uso Preguntas frecuentes Analytics Api Core ID It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence How does it work? Setting Servicio Configuración Métodos de verificación Se ofrecen diferentes combinaciones de verificación según las necesidades del cliente y basado en las recomendaciones de seguridad en estándares internacionales. Device ID Es posible identificar información del dispositivo en el que el usuario realiza el proceso, como lo puede ser, la versión del celular, la IP, el navegador, y otros elementos para conocer el comportamiento de los firmantes. Diseño visual Se pueden configurar diferentes componentes visuales de la aplicación y otros elementos del proceso para que el usuario sienta familiaridad con la aplicación. Entre los elementos que se pueden modificar están: Logos: Generalmente al principio y al final del proceso de firma. Colores: se pueden escoger colores de fondo, también los colores de los botones principales y secundarios basados en los colores de fondo para mejorar el contraste. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. api Still missing from the document
- AUTHENTIKATOR | anteia
AutentiKator Terminología Beneficios Proceso Casos de uso FAQ Analytics Solicita tu DEMO It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. Core ID G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. Request DEMO
- ANS EN| anteia
Core ID ANS Security is one of the key features of all products built at anteia, which is why we take steps to stay one step ahead. We develop our products under security and privacy by design principles. We adapt to the regulatory compliance of each country where we operate. We ensure the integrity, confidentiality and availability of information according to risk profile, customer objectives and regulatory requirements. Thus, we implement an Information Security Management System (ISMS) that allows us to evaluate and deal with data security risks in a structured, efficient, documented manner that is adapted to changes in the environment. DevSecOps. The security of our software is integrated in the life cycle of its development. From the moment our products are designed to their integration and deployment, we analyze possible vulnerabilities and weak points. Multiple authentication factors. Diagrama 10: Ciclo de gestión de vulnerabilidades We use a wide range of authentication factors that can be modified according to our customers' requirements. These factors include OTP messages (phone or e-mail), facial biometrics, device ID and GPS location. Taxonomy of documents. When analyzing identity documents, we not only check that the information in the document matches official databases, but we also review the anti-counterfeiting measures of the documents such as digital codes, text fonts and holograms. Proof of life. The proof of life system verifies that the person doing the authentication is not using a photo or video of another person. This check is done with a passive and an active verification. In the passive verification it is checked that the video is not being modified by a "Deepfake". On the other hand, the active verification consists of instructing the person to do different poses while recording the video to ensure that the video is not pre-recorded. Biometric data protection. Biometric data captured by anteia are transformed into biometric templates before being saved. These templates cannot be linked to a user, therefore, in the case of data filtering, they do not represent a risk of exposure of sensitive data. Service availability. anteia offers an availability of 99.9%, which is equivalent to an approximate downtime of 8.77 hours per year. anteia takes multiple measures to guarantee a high availability of its services. These include auto-scalability of its services depending on demand, malicious packet blocking, DDoS detection and the use of failovers and backups. Privacy of information. We anonymize the information so that no data can be associated with the identity of a user. We have created a system in which we do not need to store personal data of users such as: names, surnames, identity documents, contact information, geographic locations and other personal data will be stored as hashes, which are impossible to associate with the user's identity. We make sure that the user understands what is done with their personal information. Information processing policy. anteia does not manage the data as such, but stores the Hash, which is anonymous, which prevents the data from being linked to the identity of the End User. anteia performs the procedure of anonymization of the data that through the Client manages to know, so it is responsible for the security of the data until it makes it anonymous. General information security policy. Our security policies and processes are aligned to comply with the security standards of the ISO/IEC 27000 family. Within anteia we are constantly working to manage our security policies and improve day by day to keep our customers and end users safe. Sensitive Data. We use Biometric Data (such as facial features, voice, among others) in order to verify personal identities and obtain biometric templates for further identity verification. Support and maintenance Particular Requirements (customization or adaptation). It may happen that the organization requires a series of particular additions or adaptations to the anteia system, which by definition will require programming work by the anteia development team. If the requirements are generic, i.e. apply to the installed base of anteia customers, they are evaluated and included in the anteia release roadmap and will then be available at no cost (when the corresponding version is released). In case the requirements are particular and exclusive to the Organization or if it is not possible to wait for the next version to have them, the Organization must make a requirements survey (following the requirements specification guidelines) for each requirement and send the specification to anteia. With this written specification anteia quotes the requirement. After the quotation is accepted in writing by the organization, development begins, according to the priorities of the anteia development team. All system programming tasks are performed in Colombia, where the development team is located. The cost of the installation after the development of these particular requirements will be included in the respective quotation and in case of agreement and if there is an existing contract, the corresponding annex will be modified. Definition of Maintenance and Support: Maintenance: are those updates, improvements and new versions of the platform, which may be performed by anteia freely at any time as long as it does not affect the service. In the event that a change is required by the client at the integration level, the client will be notified in advance in order to make the migration plan. The adjustments will be made during non-business hours. Support: it is the operative support that anteia offers to its clients, in relation to the platform, with the purpose that these can go to anteia, according to the following Levels of Services: Technical Support. In a first instance, we assume that the internal resources (application support staff) of the organization analyze the problem and determine if the solution can be produced without the need to resort to anteia. Some examples of this internal support have to do with database disconnections, failure of information to reach anteia due to errors in the data source, communication network failures, etc., which are problems unrelated to anteia. In many cases the problems are solved at this level and the response times depend on the organization itself. To reduce emergencies, all new installation work, database maintenance, and any other adjustments that jeopardize the stability of the system and that are to be performed by the customer on his own, must be validated by anteia support staff. Support cases induced by actions not validated by anteia should be billed separately. However, even in this case the customer may choose to contact by email the anteia support team in Bogota D.C./ San Jose CR to clarify doubts; in the email: support@anteia.co If the problem is not solved internally, then the customer can turn to anteia's support scheme. The support times that anteia offers for the different levels of support are as follows: First Level Support. In this case, the internal support level has already been exceeded and people within the organization are unable to resolve the issue. The anteia support team in Bogota Colombia, via email or telephone, contacts the customer's contact person. The contact will be the lead user if the problem is functional, or the designated support engineer if the problem requires technical attention. In case of requiring version upgrades (application of a "patch"), the support engineer designated by the organization will take care of the case. Second Level Support. When the problem cannot be solved in the first level and in case of a serious case, a remote VPN connection must be activated (in case the infrastructure belongs to the client) previously defined and following the client's security criteria, which will allow anteia's personnel in Colombia/Costa Rica to take express control of the machine or machines of the organization where the problem is occurring and to try to solve it as soon as possible. anteia accepts the security provisions and understands that access through the VPN must be limited to cases of extreme urgency. Urgent cases will be determined by the customer. It is anteia's intention to provide adequate support and to handle cases through a VPN, which is technically feasible. It must be possible to use this means before deciding whether an on-site expert presence is warranted. The organization will log all incidents escalated to the first and second level through a ticketing system available on the Internet, provided by anteia. In this system, the customer reports the support cases and should preferably attach (using the same system) screenshots, reports, messages, etc. to help anteia engineers determine the causes of the problem. Support schedule. Support is provided on business days from 8 a.m. to 6 p.m. Colombian time. In this case, support reports must also be made through the Ticketing System. Thus, the general procedure for the attention of failures/incidents reported by customers is as follows: Dialogue with the user. Receipt and documentation of the request or incident. Definition of the incident or request. Categorization of the incident or request. Functional/operational testing. Fault localization. Incident diagnosis (if required). Execution of solution procedures. Technical verification of the solution. Solution confirmation with the end user. Incident or requirement closure with customer authorization. Impact A measure of the effect of an incident on business processes and/or activities. The Impact is generally based on how the Service Levels will be affected, the following is the Impact scale that is defined. IMPACT SCALE High The organization can no longer provide some critical services to any user. Medium The organization has lost the ability to provide a critical service to a subset of system users. Low Minimal effect; the organization can still provide all critical services to all users, but has lost efficiency. Response (Contact) Times Response times to customer-reported incidents are directly proportional to the scale of impacts described in the previous item (Impact) and measure the time in which anteia support staff will be on top of incident handling. High Impact Software components from 1 to 2 hours*. Medium Impact Software components from 2 to 4 hours* Medium Impact Low Impact Software components from 4 to 8 hours* Low Impact Incident Resolution Times High Impact Maximum Temporary Solution Time (2 hours) *Maximum time of definitive solution (see Note) Medium Impact Maximum temporary solution time (4 hours) *Maximum time of definitive solution (see Note) Low Impact Maximum temporary solution time (8 hours) *Maximum time of definitive solution (see Note) *Note: All the SLAs described in this document must be analyzed together with the client in the initial project definition stage according to the real demand of the service and the client's responsibility as a preliminary. The definitive solution time is not established initially since there may be different incidents that involve some in-depth investigation or development of the solution and may involve both the customer and anteia's processes. Once the analysis of the incident is done, the estimated time for the final solution will be provided. Last Update: October 2022
- PQR EN| anteia
Sistema PQR´s (Peticiones, Quejas, Reclamos, Sugerencias) PQR System (Petitions, Complaints, Grievances, Suggestions) The Petitions, Complaints, Claims and Suggestions System (PQRS) is a tool that allows us to know your concerns and manifestations, giving us the opportunity to strengthen our service and continue on the road to operational excellence. SUGGESTION: It is a proposal submitted by a user to influence the improvement of a process of the company whose object is related to the provision of the service. PETITION: It is an action through which the user, in a respectful manner, requests from the company any information related to the provision of the service. COMPLAINT: It is the expression or manifestation that the user makes to the company for the dissatisfaction generated by the provision of our services. CLAIM: It is the opposition or disagreement presented by the user, in order for the company to review and evaluate an action related to the provision of the service in economic terms. Soy... Elige una opción Name Last Name Email PQR sobre Elige una opción Tell us more... I agree to the terms and conditions Send Thank you. We will be in touch soon.
- Privacy Policy EN | anteia
Core ID Our objective is to inform you in the simplest way about our Data Treatment Policy. If you have any questions, our communication channels are available at all times. 1. Who are we? Anteia, is a specialized company that, through its platform, provides users with a person identity verification system through digital tools that are responsible for identifying and verifying the authenticity of the End User based on their fingerprint (biometrics, voice, face), for the celebration of intelligent contracts by means of electronic signatures. This policy describes our privacy practices, establishes the purposes, scope, measures and procedures of the systems that are directly related to the personal data that the End User comes to know beforehand, in order to carry out the purpose and data processing. that the Client has contracted, as well as the mechanisms that the owners have to know, update, rectify or delete the data provided, or revoke the authorization that is granted with the acceptance of this Policy. Anteia adopts and makes public this policy to all interested parties, which contains the guidelines and essential elements for compliance with the territorial laws on data protection from which the authorization for said treatment is signed. 2.De finitions For the purposes and interpretation of this Policy, of the anteia obligations as well as the obligations and rights of the Holders, the terms indicated below will have the following meanings: Authorization: Prior, express and informed consent of the Holder for the Treatment of personal data, in accordance with the purposes and in the terms of this Privacy Policy and Protection of Personal Data. Privacy Notice: Verbal or written communication through which the Data Controller informs the Holder about the existence of the Privacy Policy that applies to him, the way to access it and the purposes of the Treatment that is intended. give personal data. The privacy notice is used only if it is not possible to make the Privacy Policy available to you. Database: Organized set of personal data that is subject to Treatment. Channels to exercise rights: Means of reception and attention to requests, queries and claims that the Responsible and/or the Treatment Manager make available to the Data Holders so that they can exercise their rights. Biometric data: These are the biological or physical traits that allow a person to be identified as unique compared to the rest of the population; They are biometric data, among others, the fingerprint, the facial features, the pattern of the iris of the eye, the tone or timbre of voice. Personal data: These are those that allow a person to be identified, for example, name, telephone number, ID, etc. Semi-private Data: Data that is not of an intimate, reserved, or public nature and whose knowledge or disclosure may be of interest to its owner and to a certain sector or group of people or to society in general. Public data: These are data that are not classified in the other categories, which is why they are considered residual, that is, they are not semi-private, private or sensitive. These concern a general interest, such as public documents, judicial sentence, those related to the civil status of people, among others. Sensitive data: Data that is only relevant to its Owner, of a reserved nature and therefore primarily protected from potential marginal or discriminatory treatment, and that disturb the dignity of the affected or owner. Public information: It is all information that an obligated subject generates, obtains, acquires, or controls in its capacity as such. Classified public information: It is that information that, being in the possession or custody of an obligated subject in its capacity as such, belongs to the personal, private and semi-private sphere of a natural or legal person, for which reason its access may be denied or excepted, as long as it concerns legitimate and necessary circumstances and individual or private rights. Responsible for the Treatment: Natural or legal person, public or private, that by itself or in association with others, decides on the database and/or the Treatment of the data. Data Processor: Natural or legal person, public or private, that by itself or in association with others, performs the Processing of personal data on behalf of the Data Controller and following his instructions. Owner: Natural person whose personal data is subject to Treatment. Treatment: Any operation or set of operations on personal data, such as collection, storage, use, circulation or deletion. Client: Natural or legal person, public or private, that has its own privacy policy and uses anteia services to be able to verify its own clients, who will be responsible for data processing, storage and security of the same and that They will refer to this policy and prior conditions as the end user. End user: That person who, by order of the Client, uses the services contracted by him in advance. Operator: The information operator is the person, entity or organization that receives personal data from the source about various owners of the information, manages them and makes them known to users under the parameters of the law. Source of data: The source of information is the person, entity or organization that receives or knows personal data of the holders of the information, by virtue of a commercial or service relationship or of any other nature and that, by reason of legal authorization or of the owner, provides these data to an information operator, who in turn will deliver them to the end user. Transfer: The transfer of data takes place when the person in charge and/or in charge of the processing of personal data sends the information or personal data to a recipient, who in turn is the person in charge of the treatment and is located in the same country or in another country. geographic location. Transmission: Treatment of personal data that implies the communication of the same inside or outside a territory, in order for the Manager to carry out the Treatment on behalf of the Responsible. anteia INTELLIGENT ASSISTANT: - Intelligent System that through video (cognitive computing) makes the purchasing, contracting, and connection process more reliable, simple, and secure. 3. Principles of Personal Data Processing During the processing of your personal data, anteia will observe the following principles at all times: 1. Principle of access and restricted circulation: The Treatment is subject to the limits that derive from the nature of the personal data and the authorizations given by the owner, as well as the provisions of this Policy, of the Territorial Law where the data is carried out. data treatment. Treatment may only be done by persons authorized by the Owner and/or by persons provided by law. 2. Principle of confidentiality: All persons involved in the Processing of personal data, when these data are not of a public nature, are obliged to guarantee the confidentiality of the information, even after the end of their relationship with any of the tasks included in the Treatment, being able to only provide or communicate personal data when it corresponds to the development of the activities authorized in the Territorial Law where the data processing is carried out. 3. Principle of Purpose: the Treatment will obey a legitimate purpose, and the declared, determined and explicit purpose made by the owner of the data in the express authorization for its treatment. 4. Principle of Freedom: Treatment may only be exercised with the prior, express and informed consent of the Holder. Personal Data will not be obtained or disclosed without prior authorization, or in the absence of a legal or judicial mandate that relieves the Owner's consent. 5. Principle of proportionality: anteia undertakes to only process personal data that is adequate, pertinent and limited to the minimum necessary in relation to the purposes that justify its treatment in accordance with the authorization duly granted. 6. Security principle: anteia, as Responsible and/or in charge of the Processing of personal and sensitive data, will provide the necessary technical, human and administrative measures to provide security to the personal data records, avoiding their adulteration, loss, consultation, use or unauthorized or fraudulent access. 7. Principle of Veracity or Quality: The information subject to Treatment will be true, complete, exact, updated, verifiable and understandable, the owner will be able to know, update and rectify the information collected in databases and the other rights, freedoms and guarantees to which refer to the territorial laws on data protection where the authorization to said treatment is signed. 8. Principle of maximum publicity for universal owner: All information in the possession, control or custody of an obligated subject is public and may not be reserved or limited except by legal provision. 4. Sensitive data Anteia recognizes the optional nature of the response to questions regarding sensitive data, therefore, in cases in which data is processed temporarily, it is committed to protecting your personal and sensitive data, your privacy and your security. For the above, we have a highly qualified technical privacy team, which is committed to protecting all personal and sensitive data collected in each of the services we provide and guaranteeing that they are handled in accordance with the territorial laws of where it is carried out. the processing of data, and this policy, especially guaranteeing the right to the protection of personal data. 5. Biometric Data Anteia may collect biometric personal information (such as fingerprints, selfie facial photographs, iris, cadences, voice, signature, facial recognition, morphological features, among others), hereinafter "Biometric Data" in order to allow the identification of Users and/or o Holders, in accordance with the security parameters established in the regulation where the data is processed, good practices and those indicated by the authorities. 6. Rights of the Holders a. Know, update and rectify your personal data before the Treatment Managers or Treatment Managers. This right may be exercised, among others, against partial, inaccurate, incomplete, fractioned, misleading data, or those whose Treatment is expressly prohibited or has not been authorized; b. Request proof of the authorization granted to the Treatment Manager except when expressly excepted as a requirement for Treatment. c. Submit complaints to the respective competent authority for violations of the laws that regulate the protection and treatment of data and other regulations that modify, add or complement it; d. Revoke the authorization and/or request the deletion of the data when the Treatment does not respect the principles, rights and constitutional or legal guarantees or at the will of the data owner who does not want their data to continue to be processed by the company, unless Your data must continue to be processed by virtue of the Law or judicial order, in which case the owner will be informed respectively. The revocation and/or deletion will proceed when the respective competent authority has determined that in the Treatment the Responsible or Person in Charge has engaged in conduct contrary to the Data Protection Law of the territory where the treatment is carried out. and. Free access to your personal data that have been processed; 7. Prior obligations to. Inform the Client that because it is sensitive data, it must notify the end user that the latter is not obliged to authorize its Treatment, if the case arises, that the end user does not grant authorization for the treatment of their data, anteia will not be able to authenticate its identity. b. In the event that the Client acts as data controller, anteia will request the Client to inform the owner explicitly and in advance, that data will be processed directly or through third parties permanently or temporarily and therefore, if the End User agrees, he will give his express consent. In the same way, anteia may request it from the End User, with the express instruction of the Client. c. In the event that the Client acts as data controller, before ensuring that the data is processed temporarily and as a manager in accordance with the highest regulatory standards worldwide. d. In the event that anteia acts as data controller, it will directly request the End User for authorization to process the data and will ensure that it is processed in accordance with the highest regulatory standards worldwide. 8. Purposes of the Processing of Personal Information and Sensitive Personal Information The Processing of personal data that anteia carries out obeys a legitimate purpose and its corporate purpose, a specific, explicit and legitimate purpose that will be expressly authorized by the data owner, for which, anteia has three (3) systems of which which, each one has the authorization and the purpose of said treatment is clearly expressed. 1. In the case in which anteia acts as temporary data manager: The information of the owner of the data collected and processed temporarily by anteia, will be limited to the development of the corporate purpose of anteia and the service used by the End User and as informed the client. The foregoing, in accordance with the purpose contained in the authorization signed by the owner. 2. In the case in which anteia acts as data manager: The information of the owner of the data collected and processed temporarily by anteia, will be limited to the development of the corporate purpose of anteia and the service used by the End User, in accordance with the informed by the Client, according to the purpose contained in the authorization signed by the owner. 3. In the case in which anteia acts as data controller: The information of the owner of the data collected and processed by anteia will be limited to the development of the corporate purpose of anteia and the service used by the End User, according to the purpose contained in the signed authorization. by the owner. The sensitive, semi-private and private data that is collected during the use of the anteia and/or third-party platforms may be used for statistical, scientific purposes, to generate analysis, projections, improve the user experience or other valuable information; However, these will be treated as data unrelated to the owner of the data and it will not be understood that Anteia keeps the client's database, since it has proceeded to anonymize it in its capacity as manager. 9. Special Purposes of Personal Information and Personal Information The Processing of personal data carried out by anteia obeys a legitimate purpose and its corporate purpose, therefore, the personal and sensitive data provided to anteia will have the following special purposes: 1. For the correct execution of the contract signed between the Client and/or Owner and anteia. 2. Creation of the account to access the services provided by anteia. 3. Complete the profile information to access the platform or back Office of anteia. 4. Identity verification of the Holder, with the use of the current identity document that serves to prove the identity of the Holder. 5.Creation of the digital identity of the Owner. 6. Obtain information from the Owner from other sources to compare it with that collected by anteia. 7. Verification of the data contained in the identity document and the facial biometrics of the Holder before the competent entity, in order to corroborate that the identity document presented for the procedures and/or services is authentic and corresponds to the one registered in the database. of data from the competent entity. 8. Review of the Holder's police, criminal and judicial record. 9. Consultation of international and national restrictive lists to prevent and manage risks of money laundering, financing of terrorism, LAFT within the framework of compliance with SIPLAFT, SARLAFT, SARO and SAGRILAFT, for detection and prevention of fraud and security issues. 10. Collection and storage of the results of the consultation of criminal records, judicial records or fraud warnings for the verification of identity for the purposes of anteia commitment to the prevention of fraudulent practices and risk assessment. 11. Reception of information about the Owner, their activities inside and outside the anteia Platform through its allies or information about the experiences and interactions that the Owner has had through allied advertisers. 12. Billing and other tax effects, in which case it will be shared with the competent authority of each country, in charge of developing said work. 13. Payment processing for services purchased by the Holder. 14. Compilation of the services used by the Holders and the way in which they use them. 15. Improvement of anteia's commercial and promotional initiatives, as well as the analysis of the pages visited and the searches carried out by the Owners, to improve the offer of content and articles, personalization of this content, its presentation and anteia services. 16. Sending information through text messages and/or emails provided by the Holder, about the services, changes to these or their rates, payment reminders, promotions, events and information of interest to Holders in general. 17. Analysis of personal information by anteia, its shareholders, affiliates and/or related parties, and third parties contracted for the development and promotion of the sale of services provided by anteia. 18. Consult the credit, financial and commercial behavior of the Holder to the financial information centers and/or whoever represents their rights and to any other database or any other authorized entity, the personal, sensitive, confidential information resulting from all direct or indirectly from the contract, as well as the breach of obligations. 10. Processing of Personal Data 1. Data treatment. anteia will treat the public data of the holders in accordance with the purpose for which said information is captured, taking the necessary measures to guarantee compliance with the respective legal principles and obligations. 2. Treatment of sensitive data. anteia will only process sensitive personal data in those cases that are strictly necessary, for which it will request prior and express authorization from the data owner and inform them of the specific purpose of the Treatment. Paragraph: anteia will only store the personal data of the End User when it is expressly stated in the authorization for data processing. 11. Classification of Databases Anteia has classified its Databases as follows: 1. Customer Databases. Corresponds to manual and/or automated databases, which contain data of a public and private nature of legal or natural persons, with which a contractual and/or commercial link is maintained in the development of anteia's corporate purpose. This database may contain personal data authorized by the owner and whose purpose is compliance, execution and development of contractual relationships and the sending of advertising material, event information or services offered by the company. The Treatment of this data for purposes other than the development and execution of the contractual relationship or the fulfillment of duties of a legal nature, will require prior authorization from the owner. 2. Supplier Databases. They are manual and/or automated databases that contain personal data of owners with whom there is a contractual and/or commercial relationship between anteia and the owner of the data and whose purpose is Treatment to comply with contractual and legal obligations. 3.Labor databases. They are the manual and/or automated databases that contain data of holders who present themselves as candidates, or are labor related to anteia, or are former employees of anteia, and whose purpose is to identify the holder to comply with legal provisions. and regulatory. This database incorporates private and public information, sensitive data, and minor data. The Processing of personal data for purposes other than compliance with the obligations derived from the employment relationship will require prior authorization from the owner or his Legal Representative, as the case may be. In no case will anteia treat sensitive or minor data without prior authorization. anteia, will carry out the Processing of the Personal Data of the Candidates for the purpose of determining if they qualify for the profile of a position to be filled, after carrying out a selection process, to verify the quality of the information provided by the candidate and the authenticity of it and to store the data in order to be used in future selection processes. 12. What information does anteia request? anteia for the fulfillment of its purpose and in accordance with what is stated in this policy requests the following information: Name of the full owner. Identification number (citizenship card, foreigner card or any other ID) Biometric data and personal image. Physical address. Email. Cell phone. Background check (judicial, criminal, police, prosecutors, attorney, comptroller and restrictive lists) Consultation of judicial and criminal processes. anteia reserves the right to request data other than those mentioned and in this case, it will clearly inform the Client and/or End User the purpose of the requested data processing. 13. Security and integrity of information During the time that anteia requires the personal and sensitive information of the End Users and as established in its privacy and information security policy management manual, it provides all the security mechanisms when processing data. anteia uses tools such as firewalls and data encryption. Likewise, in the aforementioned cases, in the corresponding cases, store personal and sensitive data, as established in its privacy policy management manual, and information security. We also require the use of different identity authentication mechanisms each time you access your online account. 14. anteia as responsible for th e Processing of Personal and Sensitive Data Anteia is committed to complying with the duties imposed by law, therefore, it must act in such a way that it complies with the following obligations: Guarantee the End User, at all times, the full and effective exercise of the right to know, update or rectify their Personal Data. Request and keep, under the conditions provided in this Policy, a copy of the respective authorization granted by the End User. Clearly and sufficiently inform the End User about the fidelity of the collection and the rights that assist him by virtue of the authorization granted. Inform at the request of the End User about the use given to their Personal Data. Process the queries and claims formulated in the terms indicated in this Policy. 15. anteia as person in charge of the Processing of Personal and Sensitive Data anteia carries out the Data Processing on behalf of another entity or organization (Responsible for the Treatment) as manager or representative or equivalent figure, for which it must comply with the following duties: Guarantee the Owner, at all times, the full and effective exercise of the right of habeas data. Keep the information under the necessary security conditions to prevent its adulteration, loss, consultation, use or unauthorized or fraudulent access. Timely update, rectify or delete the data. Update the informa tion reported by the Treatment Managers within the following five (5) business days from its receipt; in accordance with the territorial laws where the data processing is carried out. Refrain from circulating information that is being disputed by the Owner and whose Blocking has been ordered by the judicial authorities or control entities. Allow access to the information only to persons authorized by the Holder or empowered by the territorial law of where the data processing is carried out for said purpose. Inform the control entities and/or judicial authorities when there are violations of the Security Codes and there are risks in the administration of the information of the Holders. In this case, anteia will treat the End User's data in accordance with the highest regulatory standards worldwide and will provide all security mechanisms for data storage. 16. anteia as temporary manager of the Processing of Personal and Sensitive Data Anteia carries out the Data Processing on behalf of another entity or organization (Responsible for the Treatment) as manager or temporary representative or equivalent figure, for which it will not store the data and must comply with the following duties: Guarantee the Owner, at all times, the full and effective exercise of the right of habeas data. Keep the information under the parameters of anonymization. Update the information reported by the Treatment Managers within the following five (5) business days from its receipt; in accordance with the territorial laws where the data processing is carried out. Refrain from circulating information that is being disputed by the Owner and whose Blocking has been ordered by the judicial authorities or control entities. Allow access to the information only to persons authorized by the Holder or empowered by the territorial law of where the data processing is carried out for said purpose. Inform the control entities and/or judicial authorities when there are violations of the Security Codes and there are risks in the administration of the information of the Holders. In this case, anteia will temporarily process the data of the End User until the data collected is anonymized and the database is delivered to the Client, in accordance with the highest regulatory standards worldwide. 17. Cookies Cookies are data files (not codes) created and sent by a website and stored in the user's browser. In this way, the website can consult the previous activity of the browser. A cookie cannot delete or read information from the data owner's computer, nor can it identify a person, but rather recognizes a computer-browser-user combination. Cookies have different functions according to the purpose for which they are used, there are advertising, functionality or personalization cookies, those that are strictly technical, analysis cookies and behavioral advertising cookies. Cookies are a fundamental part of the operation of the Intelligent System, their main objective is to improve the user experience, so that it is more comfortable and efficient, however, before not using cookies for commercial purposes, not to advertise or to transfer cookies to third parties. 18. Authorization for data processing Anteia will request, prior to the processing of the data, the data owner's authorization for the processing of personal data by any means, physical or electronic, that allows it to be used as proof of authorization. The authorization will contain at least the following information: 1.The Treatment to which the personal data will be subjected and the specific purpose thereof. 2.The time for which your personal data will be processed. 3. The rights that assist you as Owner. 4.The website, email, physical address and other communication channels through which you can make queries and/or claims before anteia. 5. Anteia will keep the authorizations obtained in physical or electronic form, guaranteeing their subsequent consultation. 6. In the event that the processing of sensitive data or of children and adolescents is carried out, the sensitive nature of this type of information will be informed in advance and the owner will be given the option to respond. 19. Petitions, queries or claims. For the purposes of exercising the rights of the owner to know, update, rectify, and delete the personal data that he has provided to The Client, he may contact The Client through the notification data provided by him in his Privacy Policy . In order to file subsidiary requests, queries or claims to those presented directly to the Client or against authentication of the identity of the data owner, you can contact anteia through the email pqr@anteia.co . In said communication, the owner must indicate the request or right being exercised, the name and surname of the owner and the contact information to receive notifications. This right may be exercised, among others, against partial, inaccurate, incomplete, fractioned, misleading data, or those whose treatment has not been authorized by the owner. By legal provision, anteia has ten (10) business days to respond to requests, which can be extended for a period of five (5) business days when it is not possible to respond to the query within the established term. In addition to the provisions of this Policy, the procedures to follow for the attention of queries and claims will be those established in the applicable regulations of the territory where the data processing is carried out. 20. International transfer and transmission of personal data. anteia carries out the international Transmission or Transfer of personal data, in this case anteia, in addition to having the express and unequivocal authorization by the End User, will ensure that the action provides adequate levels of data protection in accordance with security parameters. established in the regulation where the data is processed, good practices and those indicated by the authorities. On the other hand, when anteia carries out International Data Transmission, it may do so without the authorization of the owners, as long as it guarantees the security of the information, confidentiality and the conditions that regulate the scope of data processing. since, the disclosure to Managers does not require consent (it is not considered transmission). The third party recipient will assume the same obligations as the person in charge who transferred the data. For this purpose, anteia will sign the corresponding contract for the transmission of personal data in the terms established by the applicable regulation. For the transmission of data, consent is not required when: It is necessary for the fulfillment of a contract in the interest of the owner. Is necessary for the maintenance or fulfillment of a legal relationship between the person in charge and the owner. It is allowed as established in article 16 of Law 1581 of 2012. 21. Applicable Law: By using any anteia service, you accept that the applicable law depends on the Arbitration Center in Colombia, the substantive laws of the country where the dispute originates and under the principles of the General Data Protection Regulation (RGPD) [(UE) 2016 /679 of the European Parliament and of the Council of April 27, 2016.] 22. Changes to this privacy policy The policy will be revised from time to time to take into account changes in our operations or practices, and further to ensure that it continues to be appropriate to any changes in law, technology and the business environment. All personal information held will be governed by our most current policy. 23. Normat ive Reference This Privacy Policy has been prepared in accordance with the following regulations: the laws applicable to the territory where the data processing will take place and Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016. Last updated: March 2023
- terms and conditions EN | anteia
Core ID Our goal is to inform you in the simplest way about the terms and conditions, which define the conditions under which the User agrees to access the contents and procedures provided by anteia, define the rights, obligations, consequences of non-compliance with the provisions defined and other relevant information for the use of the anteia platform, which are accepted by the User when using it. 1. About us anteia, is a specialized company that, through its platform, provides users with an identity verification system through digital tools that identify and verify the authenticity of the user based on their fingerprint (biometrics, voice, face), for the conclusion of smart contracts through electronic signatures. anteia automates the collection of information and personal data from both public and private sources, these databases are consulted in real time to generate the authentication of the Users and allow them to securely carry out procedures and/or sign contracts. Translated with www.DeepL.com/Translator (free version) 2. Scope The User must read, understand and accept all the conditions set forth in the General Terms and Conditions and in the Privacy Policy, as well as in the other documents incorporated therein by reference, prior to registration with anteia. ANY PERSON WHO DOES NOT ACCEPT THESE GENERAL TERMS AND CONDITIONS, WHICH ARE MANDATORY AND BINDING, MUST REFRAIN FROM USING THE SITE AND/OR SERVICES. 3. System Services and Authentication Factors Both the content, services and authentication factors may be modified or eliminated by anteia, with the objective of guaranteeing the security and privacy of the User during the use of the system. 4. Conditions of services In order to use the services of the system, it is necessary for the User to register in the anteia system through the registration process. anteia may establish additional authentication mechanisms that it deems convenient to use the services of the system, such as, but not limited to the use of biometrics (facial, voice, fingerprints), GPS, among others, always under the technical and security standards that guarantee the proper handling of the information, and in compliance with the applicable regulations. 5. User Rights When using the anteia system, the User will provide his/her personal and sensitive data, for which the User will have the rights and duties indicated by law and in anteia's privacy policy, which is published on anteia's website. 6. User Obligations Be of legal age and have legal capacity to use the system. No lesser data will be treated and in case of registering them, they will be eliminated immediately. Use the anteia system correctly, in good faith, in such a way that no errors, violations, and/or leaks or unauthorized data processing are generated. To use properly the services and contents of the anteia system, especially not to give imprecise, indeterminate or inaccurate instructions. anteia reserves the right to authorize or not an operation requested by the User, when, in the opinion of anteia, it is not clear, precise or determinable, or generates doubts regarding possible situations of fraud and/or identity theft, a reservation that the User accepts. Not to allow third parties to make use of the system, to provide third parties with identity elements that allow them to register and/or authenticate themselves in the anteia system in the User's name, or to provide information that may jeopardize the User's access data to the system. Not to allow third parties to operate the services and contents of the anteia system. To comply with the conditions and requirements necessary to carry out the operations through the system, such as carrying out a correct use of the operation of the system, providing complete information in the forms and applications, avoiding damages in the data transmission systems and avoiding omissions or actions that harm the use of the system and that are out of anteia's control. To have a legally acquired mobile device, and whose operating system and/or functionalities have not been violated in terms of technological security, being the responsibility of the User the good use of the mobile device and the information that he/she has in it and that may alter the services provided by anteia. 7. User Authentication Factors The system authentication factors with which the User enters and uses the system are for personal and non-transferable use. The User undertakes to keep them under absolute reserve, and to manage them with the utmost care so that no one else has access to the services offered in anteia. Specifically, the User is responsible for the handling, custody and care of his/her personal mobile device (cell phone) through which he/she uses the anteia system, since the device is a factor of authentication of the User. 8. Fees and costs anteia is authorized to establish and charge the User the fees it defines for the use of the system and/or additional services offered by anteia, which shall be governed by the regulations in force. The fees and costs that may eventually be applicable shall be previously, completely and timely informed to the User, and their collection shall only proceed when previously authorized and accepted by the User. 9. Limit of services and updates anteia will establish limitations on the services it provides according to the plan purchased by each User. At any time, anteia may update the system, trying not to influence or interrupt the service. 10. Services provided by Anteia The User authorizes anteia to block, cancel or revoke all or part of the services in the following events: In the event that anteia identifies irregularities in the use of the system, by the User. As a security measure for anteia or for the same User due to irregularities or circumstances that generate alerts or doubts regarding possible cases of fraud, identity theft, or any other irregularity that anteia considers relevant. In the event that the User does not comply with the security instructions informed by anteia. The User's non-compliance with the conditions of these terms and conditions. Any other objective circumstance that warrants such limitation. Delay in the payment of any obligation in favor of anteia. 11.Ownership of the system 12.1 Intellectual Property: The System contains materials that are the property of anteia and are protected by Colombian copyright law, international treaty provisions, trademarks and other intellectual property laws and treaties. 12.2 The System: is protected as a collective work or compilation, according to copyright, as well as other laws and international treaties. The User agrees to comply with all copyright laws and any other applicable laws, as well as any notices or restrictions regarding additional copyrights contained in the System. User acknowledges that the System contains original works that have been developed, compiled, prepared, revised, selected and organized by anteia through the application of methods and standards, through the substantial investment of time, effort and money, and therefore constitutes valuable intellectual property owned by anteia. All present and future rights to trade secrets, patents, designs, copyrights, trademarks, database rights, know-how and other intellectual property or other proprietary rights of any kind, documentation, improvements, design contributions or derivative works, and any know-how or processes related thereto, including rights in and to all applications and registrations related to the Site, shall at all times remain, for User and anteia, the sole and exclusive property of anteia. 12.3 Trademarks. The trademarks, logos and slogans or trade dress displayed on the System (collectively, the "Marks") are registered and unregistered trademarks owned by anteia. Generally, the Marks should not be used in any type of campaign or advertising or to indicate anteia's sponsorship of or affiliation with any product, service, event or organization without anteia's prior written permission. anteia acknowledges the trademarks of other organizations for their respective products or services mentioned on the site. All rights not expressly granted in these Terms are reserved by anteia. 12.4 Restrictions on Use of the Software. The Software is the intellectual property of anteia. Use of the Software is governed by these Terms. Unauthorized reproduction or distribution of the Software is expressly prohibited by law and may result in civil and criminal penalties. Proceedings may be brought against infringers. 12.5 Detection and Removal. User acknowledges and agrees that anteia and its designees may or may not, at anteia's sole discretion, pre-screen User's information. 13. Restrictions on Use of the System By using the System, including any anteia Service, the User specifically agrees not to engage in any activity, or transmit any information that in our sole discretion: Is illegal, or violates any Colombian law or provision. Incites illegal activities or discusses illegal activities with the intent to commit them. Violates any third party rights, including, but not limited to, the right to privacy, the right to one's own image, copyright, trademark rights, patents, commercial or industrial secrets; or any other intellectual property or proprietary rights. Is harmful, threatening, abusive, harassing, harassing, indecent, defamatory, sexually explicit or pornographic, discriminatory, vulgar, profane, obscene, libelous, hateful or violent, or otherwise objectionable. Interferes with any other party's use and enjoyment of the Services. Purports to impersonate any person or entity. Falsely state, misrepresent or conceal your affiliation with another person or entity. Access or use another user's account without permission. Distribute computer viruses or other code, files or programs that interrupt, destroy or limit the functionality of any software or hardware or electronic communications equipment. Interfere with, disrupt, interrupt, disable, overburden, or destroy the functionality or use of any feature of the System, or the servers or networks connected to the System, or any of the anteia Services. "Hack into" or access without permission our, another user's, or any other person's private or confidential records. Solicits personal or confidential information from other users, including, but not limited to, address, credit card or financial information, or passwords. Decompile, reverse engineer, disassemble or otherwise attempt to derive the source code of the Site, except as expressly permitted in these Terms or by law, unless permitted by applicable law without consent. Remove, circumvent, disable, damage or otherwise interfere with security-related features, or features that enforce limitations on use of the Site. Modify, copy, scrape or otherwise obtain, display, distribute, publish, license, sell, rent, lease, loan, transfer or trade any material or content on the system. Use the services to perform benchmarking, or to compile information for a product or service. In addition, Users shall not, and shall not permit others to, engage in the following activities with respect to the anteia Services: Use the anteia Services, or allow access to the anteia Services, in a manner that circumvents the contractual restrictions on use; exceeds the usage metrics; or authorized use set forth in these Terms. License, sublicense, sell, resell, rent, lease, transfer, distribute or share over time, or make any portion of the anteia Services or anteia's current technical and functional documentation for the anteia Services available for access by third parties, unless otherwise stated in these Terms; or Access or use the anteia Services or anteia Documentation for the purpose of developing or operating products or services intended to be offered to third parties in competition with the anteia Services or allow access to a direct competitor of anteia. You acknowledge that we have no obligation to monitor your or any other person's access to or use of the Site to identify violations of these Terms, or to review or edit any content. We have the right to do so, however, for the purpose of operating and improving the Site (including, without limitation, fraud prevention, risk assessment, research and customer support in accordance with the Privacy Policy and previously stated contractual purposes), to ensure compliance with these Terms, and to comply with applicable law or the order or requirement of a court, consent decree, administrative agency or other governmental body. 14. Authorization for the processing of personal and sensitive data The User authorizes anteia to collect, store, use or circulate his/her personal data, in accordance with the Privacy Policy, available on anteia's website. As part of the User's transactions with third parties through anteia's system, it may be necessary to transfer the User's personal data to third parties. In these cases, the prior and express authorization of the User will always be requested in order to carry out such transfer, and from such transfer, the third parties will be responsible for obtaining the authorizations required in the development of their own corporate purposes or activities to process the transferred personal data when they want to use them for purposes other than those mentioned above. The User authorizes anteia to collect and process his/her personal data considered as sensitive (facial biometrics, facial photography, among others - hereinafter the "Biometric Data"), according to the highest regulatory standards worldwide. anteia will process the Biometric Data in order to verify the personal identity of the User, corroborating it against public or private databases, whose administrators are responsible or in charge of the processing of personal or biometric information. The Biometric Data will allow anteia to create digital identities and/or obtain biometric templates for subsequent identity matching. Sometimes anteia may transmit such biometric templates with third parties and/or entities, in order to verify the identity of the User at the time of a transaction, request for products and/or services, always with the prior, express and informed consent of the User. Additionally, in order to optimize our technology and improve our security levels on an ongoing basis, anteia will temporarily store a copy of the User's facial photograph and/or identity document. We will require the express authorization of the User to make use of this Biometric Data, and we specify that since it is Sensitive Data, the User is not obliged to authorize its treatment. In case the treatment of Biometric Data is not authorized by the User, it will not be possible to offer the services of the anteia system, since anteia requires the use of Biometric Data to comply with anteia's security standards. For more information about the treatment of biometric data and/or sensitive data of the User, please refer to anteia's Privacy Policy. 15. Security Recommendations. The User agrees to consult and comply with the security recommendations set forth in these terms and conditions of use, as well as those that may be published on anteia's website. 16. Modifications anteia reserves the right to modify, limit, delete or add items to these terms and conditions at any time. The modifications, limitations, deletions or additions to the present terms and conditions will be informed by publication on anteia's website, it is the User's duty to review them periodically, since the User accepts them with the use of the system. Last update: June 2022.
- ANS | anteia
Core ID ANS La seguridad es una de las características claves de todos los productos construidos en anteia , por esta razón tomamos medidas para estar un paso adelante. Desarrollamos nuestros productos bajo principios de seguridad y privacidad por diseño. Nos adaptamos al cumplimiento de la regulación propia de cada país donde operamos. Aseguramos la integridad, confidencialidad y disponibilidad de la información de acuerdo con perfil de riesgos, objetivos de cliente y requerimientos normativos. Así, se realiza la implementación de un Sistema de Gestión de Seguridad de la Información (SGSI) que permite evaluar y tratar los riesgos de seguridad de los datos de forma estructurada, eficiente, documentada y adaptada a los cambios del entorno. DevSecOps. La seguridad de nuestro software está integrada en el ciclo de vida de su desarrollo. Desde el momento que se diseñan nuestros productos hasta la integración y el despliegue, analizamos posibles vulnerabilidades y puntos débiles de estos. Múltiples factores de autenticación. Diagrama 10: Ciclo de gestión de vulnerabilidades Usamos una amplia gama de factores de autenticación que pueden ser modificados según los requerimientos de nuestros clientes. Dentro de estos factores se encuentran mensajes de OTP (teléfono o e-mail), biometría facial, device ID y localización GPS. Taxonomía de documentos. Al analizar los documentos de identidad no solo nos fijamos en verificar que la información del documento concuerde con bases de datos oficiales, sino que también revisamos las medidas de anti-falsificación de los documentos como códigos digitales, fuentes de texto y hologramas. Pruebas de vida. El sistema de prueba de vida verifica que la persona que está haciendo la autenticación no esté usando una foto o un video de otra persona. Esta comprobación se hace con una verificación pasiva y una activa. En la verificación pasiva se revisa que el video no esté siendo modificado por un “Deepfake”. Por otro lado, en la verificación activa consta de darle instrucciones de hacer diferentes poses a la persona mientras graba el video para asegurarnos que el video no sea pregrabado. Protección de datos biométricos. Los datos biométricos capturados por anteia son transformados a plantillas biométricas antes de ser guardados. Estas plantillas no pueden ser relacionadas con un usuario, por lo tanto, en el caso de un filtrado de información las mismas no representan un riesgo de exposición de datos sensibles. Disponibilidad de servicio. anteia ofrece una disponibilidad de 99.9%, lo que equivale a un downtime aproximado de 8.77 horas anual. anteia toma múltiples medidas para garantizar una alta disponibilidad de sus servicios. Dentro de estas está la auto escalabilidad de sus servicios dependiendo de la demanda, bloqueo de paquetes maliciosos, detección de DDoS y el uso de failovers y backups. Privacidad de información. Anonimizamos la información de manera que no se pueda asociar un dato con la identidad de un usuario. Hemos creado un sistema en el cual no necesitamos guardar datos personales de los usuarios como: nombres, apellidos, documentos de identidad, datos de contacto, ubicaciones geográficas y demás datos personales quedarán guardados como hashes, los cuales son imposible de asociar con la identidad del usuario. Velamos porque el usuario comprenda que se hace con su información personal. Política de tratamiento de información. anteia no administra el dato como tal, sino que almacena el Hash, el cual es anónimo lo que impide que se pueda vincular el dato con la identidad del Usuario Final. anteia realiza el procedimiento de anonimización de los datos que por medio del Cliente logra conocer, por lo cual se encarga de la seguridad del dato hasta que lo convierte en anónimo. Política general de seguridad de la información. Nuestras políticas y procesos de seguridad están alineadas para cumplir con los estándares de seguridad de la familia de la ISO/IEC 27000. Dentro de anteia trabajamos constantemente para gestionar nuestras políticas de seguridad y mejorar día a día para mantener a nuestro clientes y usuarios finales seguros. Datos sensibles. Usamos Datos Biométricos (como rasgos faciales, voz, entre otros) con el fin de verificar identidades personales y obtener plantillas biométricas para posteriores verificaciones de identidad. Soporte y mantenimiento Requerimientos Particulares (de personalización o adaptación). Podría suceder que la Organización requiera una serie de adiciones o adaptaciones particulares al Sistema anteia, los cuales por definición necesitarán labores de programación a cargo del equipo de desarrolladores de anteia. Si los requerimientos son genéricos, es decir aplican para la base instalada de clientes de anteia , estos son evaluados e incluidos en el “roadmap” de versiones de anteia y luego estarán disponibles sin costo (cuando la versión correspondiente sea liberada). En caso de que los requerimientos sean particulares y exclusivos para la Organización o bien que no se pueda esperar a la próxima versión para contar con ellos, la Organización debe hacer un levantamiento del o los requerimientos (siguiendo lineamientos de especificación de requerimientos) de cada requerimiento y enviar la especificación a anteia. Con esta especificación escrita anteia cotiza el requerimiento. Después de que dicha cotización es aceptada por escrito por la Organización, se inicia su desarrollo, atendiendo a las prioridades del equipo de desarrollo de anteia . Todas las tareas de programación del Sistema se realizan en Colombia, en donde se encuentra el equipo de desarrolladores. El costo de la instalación posterior al desarrollo de estos requerimientos particulares se incluirá en la cotización respectiva y en caso de estar de acuerdo y exista contrato vigente, se modificará el anexo correspondiente. Definición de Mantenimiento y Soporte: Mantenimiento: son aquellas actualizaciones, mejoras y nuevas versiones de la plataforma, las cuales podrán ser realizadas por anteia de manera libre en cualquier momento siempre y cuando no afecte el servicio. En caso de que se requiera algún cambio por parte del cliente a nivel de integración se le notificará previamente para realizar el plan de migración. Las adecuaciones se realizarán en horarios no hábiles. Soporte: es el apoyo operativo que ofrece anteia a sus clientes, en relación con la plataforma, con el fin que estos puedan acudir a anteia , conforme los siguientes Niveles de Servicios: Soporte Técnico. En una primera instancia, suponemos que los recursos internos (personal de soporte a las aplicaciones) de la organización analizan el problema y determinan si la solución puede producirse sin necesidad de recurrir a anteia. Algunos ejemplos de este soporte interno tienen que ver con desconexiones de la base de datos, falta de llegada de información a anteia por errores en la fuente de los datos, fallas de la red de comunicación, etc., los cuales son problemas ajenos a anteia. En muchas ocasiones los inconvenientes son resueltos a este nivel y los tiempos de respuesta a los mismos dependen de la misma organización. Para reducir las emergencias, todo trabajo de nuevas instalaciones, mantenimiento de bases de datos, y cualquier otro ajuste que ponga en peligro la estabilidad del sistema y que sea el cliente el que los vaya a realizar por sus propios medios, debe ser sometido a validación por parte del personal de soporte de anteia . Casos de soporte inducidos por acciones no validadas por anteia deberán facturarse por aparte, Sin embargo, aún en este caso el cliente puede optar por contactar por correo electrónico al equipo de soporte de anteia en Bogotá D.C./ San José CR para aclarar dudas; en el correo: support@anteia.co Si el problema no se soluciona internamente, entonces el cliente puede recurrir al esquema de soporte de anteia . Los tiempos de atención que anteia ofrece para los diferentes niveles de soporte son los siguientes: Soporte Primer Nivel. En este caso, ya se ha superado el nivel de soporte interno y las personas de la organización no pueden resolver el asunto. El equipo de soporte de anteia en Bogotá Colombia vía correo electrónico o telefónica, se pone en contacto con el interlocutor del cliente. El interlocutor será el usuario líder si el problema es funcional, o el ingeniero de soporte designado si el problema requiere de atención técnica. En caso de requerir actualizaciones de versión (aplicación de un “parche”), el ingeniero de soporte designado por la organización realizará la atención del caso. Soporte Segundo Nivel. Cuando el problema no pueda resolverse en el primer nivel y tratándose de un caso grave, se deberá activar una conexión remota VPN (en caso de que la infraestructura sea del cliente) previamente definida y siguiendo los criterios de seguridad del cliente, la cual permitirá al personal de anteia en Colombia/Costa Rica tomar control expreso de la máquina o máquinas de la organización donde se esté presentando el problema y procurar su resolución a la brevedad. anteia acepta las disposiciones de seguridad y comprende que el acceso a través de la VPN debe ser limitado a casos de extrema urgencia. Será el cliente quien determine los casos urgentes. Es la intención de anteia otorgar el soporte adecuado y atender casos a través de un VPN, lo cual es viable técnicamente. Este medio debe poder utilizarse antes de decidir si se amerita una presencia del experto “in situ”. La organización registrará todos los incidentes que se escalen al primer y segundo nivel a través de un sistema de ticketing disponible en Internet, provisto por anteia . En este sistema, el cliente reporta los casos de soporte y de preferencia deberá anexar (usando el mismo sistema) pantallas, reportes, mensajes, etc. que ayuden a los ingenieros de anteia a determinar las causas del problema. Horario del soporte. El soporte se otorga los días hábiles en horario de 8 a.m. a 6 p.m. hora colombiana. En este caso los reportes de soporte también se deben hacer a través del Sistema de Ticketing. Así, el procedimiento general para la atención de fallas/incidentes reportados por los clientes anteia: Diálogo con el usuario. Recepción y documentación de la solicitud o incidente Definición del incidente o solicitud. Categorización del incidente o solicitud. Pruebas de funcionamiento/operación. Localización de la falla. Diagnóstico del incidente (en caso de ser requerido). Ejecución de procedimientos de solución. Verificación técnica de la solución. Confirmación de solución con el usuario final. Cierre del incidente o requerimiento con autorización de cliente. Impacto Es una medida del efecto de un incidente en los procesos y/o actividades propias del negocio. El Impacto generalmente se basa en cómo los Niveles de Servicio se verán afectados, la siguiente es la escala de Impacto que se define. ESCALA DE IMPACTO Alto La organización ya no puede proporcionar algunos servicios críticos a ningún usuario. Medio La organización ha perdido la capacidad de proporcionar un servicio crítico a un subconjunto de usuarios del sistema. Bajo Efecto mínimo; la organización aún puede proporcionar todos los servicios críticos a todos los usuarios, pero ha perdido eficiencia. Tiempos de Respuesta (Contacto) Los tiempos de respuesta a los incidentes reportados por el cliente son directamente proporcionales a la escala de impactos descrita en el ítem anterior (Impacto) y miden el tiempo en el cual el personal de soporte de anteia estará al frente de la atención de los incidentes. Impacto Alto Componentes de software de 1 a 2 horas* Impacto Medio Componentes de software de 2 a 4 horas* Impacto Bajo Componentes de software de 4 a 8 horas* Tiempos de Solución a Incidentes Impacto Alto Tiempo máximo de solución Temporal (2 horas) *Tiempo máximo de solución definitiva (ver Nota) Impacto Medio Tiempo máximo de solución temporal (4 horas) *Tiempo máximo de solución definitiva (ver Nota) Impacto Bajo Tiempo máximo de solución temporal (8 horas) *Tiempo máximo de solución definitiva (ver Nota) *Nota: Todos los ANS descritos en el presente documento se deben analizar en conjunto con el cliente en la etapa inicial de definición del proyecto según la demanda real del servicio y la responsabilidad del cliente como de anteia . El tiempo de solución definitiva no se establece inicialmente ya que pueden existir distintos incidentes que impliquen alguna investigación a profundidad o algún desarrollo sobre la solución y puede involucrar procesos tanto del cliente como de anteia . Una vez se realice el análisis del incidente se entregará el tiempo estimado para la solución definitiva. Fecha de actualización: Octubre 2022
- ATENEA EN | anteia sas
atenea Terminología Beneficios Proceso Casos de uso FAQ Analytics Solicita tu DEMO Core ID It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. Request DEMO
- SERVICES EN | anteia sas
Core ID Docs Secursign Authentikator Atenea Servicios Solicita tu DEMO multiple factors A solid confidence G. lossario Identity verification is the process of checking and confirming the data and information provided by an individual to determine if it is true and corresponds to their real identity. Multi-factor or multi-factor verification is a more secure approach as it uses several methods to confirm a person's identity, rather than just one, which reduces the risk of identity theft and increases confidence in the verification. This verification is highly customizable to ensure high convertibility while maintaining high levels of security. Learn more Docs Document processing service that allows: (1) Creation of documents such as forms, contracts, promissory notes, among others. (2) Text analysis to extract valuable information from documents, such as personal data, numbers, dates, etc. (3) Document classification that allows the automatic organization of documents according to different categories. (4) Optical Character Recognition (OCR) that allows digitizing paper documents and converting them into electronic files. (5) Monitoring of information inconsistencies and risk alerts. Learn more Secursign The electronic signature is a digital method to associate authenticated persons with valid digital documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. It is based on cryptography and security technologies. In the anteia ecosystem, identity verification is performed to associate the digital identity of the signer and ensure the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes, however, through the use of digital identity, there is always a way to verify the signer's identity. It has timestamps certified by trusted authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with related regulations and document integrity. Learn more Authentikator Service that uses computer vision, machine learning and data analysis techniques to identify patterns and trends in forged documents, analyze and compare visual characteristics of a document (such as text, images, layout and formatting) against a database of known authentic documents. It has the ability to detect forged or altered features in a document and issue a warning or response if it is determined that the document is not authentic. Allows you to attach identity documents, diplomas, invoices, certificates, tax returns or any other document and validate its authenticity. Converts unstructured documents into structured ones. Convert images with text into computer-readable text data. Learn more Atenea It is an Intelligent Personal Assistant that helps end users to make the least amount of errors in their binding process, solve problems quickly and improve their registration experience. Learn more Services Authenticated Attachments. Allows you to attach identity documents, diplomas, invoices, certificates, income statements or any other document. Convert unstructured documents to structured to automate large-scale procurement data capture, increase operational efficiencies, improve customer experience, and inform decision-making by speeding and securing processes. Smart Contracts. Legal documents that can be generated automatically, stored securely on a blockchain, and have pre-programmed clauses that are automatically triggered under certain conditions, allowing for greater control and monitoring of the contract lifecycle. This can improve efficiency and security in contract management. Electronic signature. Mechanism that allows a person to be linked to an electronic message, contract or electronic document, identifying himself as a signatory of the message. Provides users with the ability to perform signatures, facilitates the distribution of legally sensitive documents for the collection of electronic signatures. Smart forms. Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. Digital identity. Identity verification information is anonymized to reuse it in future events such as management of forms, contracts or electronic signatures, which allows streamlining processes and guaranteeing the security of information. Decision engine. Run automated decisions based on custom rules as a set of processes. It uses artificial intelligence and analysis to learn and redefine decisions. Dematerialized promissory notes. Mechanism that allows you to sign, fill out and endorse promissory notes supported by dematerialized technology (secure digitization), protected with an advanced electronic signature ensuring its validity. It allows the custody and completion of blank promissory notes for processing, using a secure trace for the parties, verifying the transactions made on the promissory note. Identity verification. Multiple verification factors ensure instantly that customers, employees, suppliers are really who they say they are. Facial and voice biometrics, proof of life, identity document authenticity, GPS, mobile number, Device ID, verification in binding and non-binding lists, search in public and private sources of information and credit history._cc781905-5cde-3194- bb3b-136bad5cf58d_ Request DEMO
- SERVICES | anteia sas
Core ID Docs Secursign Authentikator Atenea Servicios Solicita tu DEMO multiple factors A solid confidence G. lossario La verificación de identidad es el proceso de comprobación y confirmación de los datos e información proporcionados por una persona para determinar si son verdaderos y corresponden a su identidad real. La verificación de múltiples factores o multifactorial es un enfoque más seguro, ya que utiliza varios métodos para confirmar la identidad de una persona, en lugar de solo uno, esto reduce el riesgo de suplantación de identidad y aumenta la confianza en la verificación. Esta verificación es altamente personalizable para asegurar una alta convertibilidad, manteniendo altos niveles de seguridad. Conoce más Docs Servicio de procesamiento de documentos que permite: (1) Creación de documentos como formularios, contratos, pagarés, entre otros. (2) Análisis de texto para extraer información valiosa de los documentos, como datos personales, números, fechas, etc. (3) Clasificación de documentos que da la posibilidad de organizarlos automáticamente según diferentes categorías. (4) Reconocimiento óptico de caracteres (OCR) que permite digitalizar documentos en papel y convertirlos en archivos electrónicos. (5) Monitoreo de incongruencias de información y alertas de riesgo. Conoce más Secursign La firma electrónica es un método digital para asociar a personas autenticadas con documentos digitales válidos. Se utiliza para verificar la identidad del remitente y garantizar la integridad y autenticidad del documento. Se basa en criptografía y tecnologías de seguridad. En el ecosistema de anteia, se realiza una verificación de identidad para asociar la identidad digital del firmante y garantizar la integridad y no repudio del documento. Nuestros métodos de validación incluyen reconocimiento facial y mensajería de texto con códigos de un solo uso, sin embargo, por el uso de la identidad digital, siempre hay una forma de verificar la identidad del firmante. Posee marcas de tiempo certificadas por autoridades confiables y puede ser verificada y almacenada por un largo tiempo. El proceso de firma electrónica requiere que todas las partes involucradas verifiquen su identidad y acepten las condiciones antes de generar el documento final, cumpliendo con las normativas relacionadas e integridad del documento. Conoce más Authentikator Servicio que utiliza técnicas de computer vision, aprendizaje automático y análisis de datos para identificar patrones y tendencias en documentos falsificados, analizar y comparar características visuales de un documento (como texto, imágenes, diseño y formato) con una base de datos de documentos auténticos conocidos. Tiene la capacidad de detectar características falsas o alteradas en un documento y emitir una advertencia o una respuesta si se determina que el documento no es auténtico. Permite adjuntar documentos de identidad, diplomas, facturas, certificados, declaraciones de renta o cualquier otro documento y validar su autenticidad. Convierte documentos no estructurados en estructurados. Convierte imágenes con texto en datos de texto legibles por computadoras. Conoce más Atenea En un Intelligent personal Assistant que ayuda a los usuarios finales a cometer la menor cantidad de errores en su proceso de vinculación, a que puedan resolver problemas rápidamente y mejorar su experiencia de registro. Conoce más Services Authenticated Attachments. Allows you to attach identity documents, diplomas, invoices, certificates, income statements or any other document. Convert unstructured documents to structured to automate large-scale procurement data capture, increase operational efficiencies, improve customer experience, and inform decision-making by speeding and securing processes. Smart Contracts. Legal documents that can be generated automatically, stored securely on a blockchain, and have pre-programmed clauses that are automatically triggered under certain conditions, allowing for greater control and monitoring of the contract lifecycle. This can improve efficiency and security in contract management. Electronic signature. Mechanism that allows a person to be linked to an electronic message, contract or electronic document, identifying himself as a signatory of the message. Provides users with the ability to perform signatures, facilitates the distribution of legally sensitive documents for the collection of electronic signatures. Smart forms. Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. Digital identity. Identity verification information is anonymized to reuse it in future events such as management of forms, contracts or electronic signatures, which allows streamlining processes and guaranteeing the security of information. Decision engine. Run automated decisions based on custom rules as a set of processes. It uses artificial intelligence and analysis to learn and redefine decisions. Dematerialized promissory notes. Mechanism that allows you to sign, fill out and endorse promissory notes supported by dematerialized technology (secure digitization), protected with an advanced electronic signature ensuring its validity. It allows the custody and completion of blank promissory notes for processing, using a secure trace for the parties, verifying the transactions made on the promissory note. Identity verification. Multiple verification factors ensure instantly that customers, employees, suppliers are really who they say they are. Facial and voice biometrics, proof of life, identity document authenticity, GPS, mobile number, Device ID, verification in binding and non-binding lists, search in public and private sources of information and credit history._cc781905-5cde-3194- bb3b-136bad5cf58d_ Solicita tu DEMO