Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

When a form is used what happens to the data on that form? This paper will answer that question in multiple ways in relation to how Quik! Forms addresses the concerns over:

  • data ownership
  • transporting data
  • ensuring data integrity
  • data access and persistence

Efficient Technology Inc (ETI), designed Quik! to enable forms automation at all levels, from a simple form to a complex workflow involving forms. Data security is of the utmost importance to ETI and the Quik! line of products.  This paper does not intend to be a marketing or sales tool to promote ETI’s products but rather to discuss the methods, concepts and options available to secure data on Quik! Forms.

Assumptions

Readers of this white paper should have a basic understanding of forms automation, modern security models and internet-based transportation of data. The technology concepts discussed in this paper do not require a technology background, but will be easier for IT professionals to understand, with the intent of making this topic understandable to all readers.

Definition of Terms

  • Application means any system, app or other software product that makes use of the Quik! software to deliver forms to end users
  • Customer means the company who is licensed to use Quik!
  • Forms means any document output by Quik! (e.g. form, application, contract, agreement, marketing document, etc.)
  • User or end-user means any person who is using a form output by the customer’s application
  • No labels