![Blue Smoke](https://static.wixstatic.com/media/998766ca964d5789797423ea691c11e8.jpg/v1/fill/w_69,h_43,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/998766ca964d5789797423ea691c11e8.jpg)
![TrustSafe Logo](https://static.wixstatic.com/media/7eb816_0a545befa0d241dda31850b43bc08eef~mv2.png/v1/fill/w_222,h_52,al_c,q_85,usm_2.00_1.00_0.00,enc_auto/trustsafe-logo_long.png)
Product Series
TS Point
Secure Document Management & Sharing System
Highlighted functions and features
-
Encrypt the documents with PKI algorithm
Strong encryption applied, AES 256 and RSA 2048.
-
Securely share the files with flexible Digital Right Management
Share files with external parties in a secure and controllable scenario while we can pre-set the time limitation, watermark, as long as prevent document editing, printing, and downloading.
-
User authentication
The confidential documents are being encrypted by correspondent authorized user's electronic certificate, which can prevent information from being read by unauthorized individuals.
-
Access management
Define who can access the documents and their access levels.
-
Short-time implementation
A web application to add, update, view and share confidential documents.
-
Tailor-made workflow with announce function
User can easily set up multiple document sharing workflows for different situations.
-
Versioning
Keep copies of documents created overtime. Provide recover function of deleted items for system
administrator.
-
Audit log
Keep track of all users’ activities
Use case
Data privacy rights play a key role in the whistleblowing procedures. Organizations need to be careful in handling personal data and report status in every single process.
An all-rounded, secure communication environment, that prevents information from being read by unauthorized individuals, is essential for sharing sensitive information like whistleblowing.
![TS Point use case](https://static.wixstatic.com/media/af2e06_12cf61f0c32d4af083840a4c5312ce7b~mv2.png/v1/fill/w_68,h_38,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/TS%20Point.png)
-
Whistleblower made a Protected Disclosure via the system with the reports and supporting documents.
-
Internal Audit & Risk Management team, who will be the Investigation Team, will receive and review the report.
-
The report can be partly shared with the internal Legal Team or external lawyers for 2nd opinion while investigating. External lawyers will be distributed the protected and access-controllable reports, which are only allowed to be reviewed and made comments.
-
If the report is needed to proceed, the results of the investigation will be escalated to the President Director.
-
Management makes the decision on the violation report.
-
Reports of the company violation are submitted to the Audit Committee.