by admin | Feb 3, 2016 | Blog
The question of “where is the contract?” often arises during any review or approval process. Many times the answer is that ‘Bob’ is reviewing it. Perhaps Bob never received his email, lost and/or deleted the email, accidentally spilled coffee on the paper copy someone put on his desk, or a million other things could’ve happened to prevent Bob from responding. Maybe Bob even forgot that he needed to get back to you. Without knowing if Bob ever received your request in the first place, would it be inconsiderate to already start nagging him about it? By automating your contracts’ workflows based on contract types or allowing for ad-hoc workflows to be created on the fly, Bob will no longer have an excuse for not getting back to you. Loosely defined, workflow automation means streamlining workflows to improve processes, increase efficiency, and maximize communication and collaboration. So, once someone in your company initiates a workflow and routes it to Bob, Bob will automatically receive an email alert as well as a task waiting for him when he logs into your contract management solution. Anyone looking to receive information about the status of the workflow can simply view the workflow history and see that Bob has received the task and has a certain amount of days to complete it by. So, what happens if Bob is lazy, out sick, or generally not available to answer the call of duty? Most contract management solutions allow for delegation or escalation if Bob still doesn’t respond. Based on Bob’s profile (usually synced with AD), he may have already predetermined who the lucky folks are...
by admin | Feb 3, 2016 | Blog
When pondering moving important confidential information contained within contract documents to the cloud, organizations sometimes cringe with fear. Thankfully, the cloud is not really that big or scary. As with any other way of storing your documents and information, there are pros and cons with moving to the cloud. For the most part, companies want to ensure their company, client, and vendor information stays safe and secure. Those without permission should not be able to access their confidential information, documents, financial data, and other pertinent items. Still, if everything is online, how can security be guaranteed? One of the main recommendations is to choose a reputable cloud hosting provider that highlights your security as one of their key features. Your provider should ensure that your infrastructure is secure and that your data and applications are protected. There are various security controls that should be put into place, as with any storage and networking system. These include deterrent controls, preventative controls, corrective controls, and detective controls. While setting up all these controls at the beginning may seem cumbersome, they will help to ensure your organization’s security and success for years to come. Organizational contracts and counterparty information can often times have its own set of security measures due to the sensitive nature of the data. For further security and privacy, it is highly recommended to utilize an identity management system to control access to info. Additionally, application security to protect all items stored within your contract management system can offer additional security measures by implementing testing and acceptance procedures for outsourced or packaged application code. Moving to the cloud may...