RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

TsUP - Document flow

Product
Developers: LaCoNix
Technology: EDMS

The document flow automation system "TsUP is Document flow" (Command center the Enterprise) provides:

  • Performance improvement of work of employees during the work with documents.
  • The structured and reliable document storage. Significant reduction of clerical expenses. * Fast movement of documents.
  • Instruments of control - an opportunity to browse all document history – who and when worked with it what changes made.

File:laconics ecm.jpg
  • Differentiation of the access levels for different employees will ensure information security.
  • Possibility of collective work with documents of different employees.
  • Significant economy of the means spent for document flow.


Organizational structure of the enterprise

All staff of the enterprise and structure with branches and child divisions is entered into the system. The structure of the enterprise and information on employees can be changed flexibly.

Evident submission of the list of all working and archive documents

Each employee can configure the homepage so that all that information most of which often interests him was visible to him. For example, the list of incoming documents, outgoing documents and documents which were recently changed.

Transfer of the existing scheme of document flow in a system and its optimization

A system itself reminds employees of that what approval of documents most relevant at the moment, and to heads - about the state of affairs on work with documents.

A system allows to create electronic ways of the movement and approval of different documents that will accelerate and will arrange document flow, will improve office-work.

In an example the way of electronic following of the document with an approval time task (at the left) is shown.

The document is quickly approved at the scheduled time without paperwork and bustle on departments. Saving of time, paper and work of secretaries. Agreements, letters, orders, orders can set standard and individual transits on instances, rules of registration and storage.

Sending document on the way, approval, imposing of resolutions, control of its movement on route

Agreement No. 351 (see a screenshot at the left) sent by the employee is at the same time being approved at the economist Gavrilova and the lawyer Kuzkina. Each of these specialists, having received the agreement, can approve it, having sent thereby is farther on instances, or not to approve, having specified the reason. In this case the agreement returns to the author for completion.

After approval by the lawyer and economist further in this example the agreement will pass to the CEO to a statement. The director sees in a system that the agreement was approved with the lawyer and the economist. After signing the agreement returns to his author for execution. Letters, orders, memos also move in a system along the corresponding routes.

The configured card of the document reflects all necessary information on it. It is possible to attach any number of documents to a card.

Viewing all change history and approvals of the document

It is possible to browse all change history of the document and its old versions. Who and when changed something in it. Thus, you will be able always to find "ends" in disputable situations.

Convenient system of search of the document

The convenient system of search allows to find quickly the necessary document on a key word, the author, date of creation or editing.

Security issues and differentiations of access rights

A system provides the high level of security:

  • Logins and passwords. Differentiation of the rights and the information access layer will allow you to distribute information on employees according to the level of their admission.
  • Possibility of use of electronic keys
  • Encoding of data by transfer does useless interception of data on the line – even if it will occur – information cannot be decrypted.
  • Password guessing - due to shutdown of a system for 5 minutes is excluded at a triple wrong set of the password.
  • Possibility of access restriction to the IP addresses. You can permit to enter to some users only from certain computers.