top of page

Resultados de la búsqueda

48 results found with an empty search

  • anteia

    1.Verificación multifactorial de identidad. 2.Identidad Digital. 3.Formularios y Contratos inteligentes. 4.Firma electrónica(fastSignature). 5.Motor de decisión. 6.Adjuntos y validación de autenticidad de documentos. 7.Pagarés. HOME HYPERAUTOMATION SERVICES SERVICES API Política de privacidad PRICES Blog Resultados de la búsqueda Members MÁS ENG Hyperautomation Una integración para automatizar de extremo a extremo procesos de vinculación. Core ID 17 factores de verificación identidad que aseguran instantáneamente la confianza en clientes y proveedores. GeniusDocs Documentos, inteligentes, autogestionados, sin incongruencias, con monitoreo 7X24x365. smart signature Firmas seguras, para negocios hiper seguros. authenticator Adjuntar y validar documentos. NOT GOING Intelligent personal assistant para acompañar a usuarios en procesos de registro. cybersecurity mesh La frontera de la ciberseguridad. Próximamente Academy Próximamente Solicita tu DEMO A single provider A single integration a single platform before It is the first platform that hyper-automates linking and sales processes, taking away the headache for companies of dealing with new technologies, integrations, regulations, development team times and unaffordable prices. To play, press and hold the enter key. To stop, release the enter key. Copyright © 2023 anteia sas All rights reserved. ANS API Contacto API ANS Medium PQR PQR Terms and Conditions Privacy Policy Política de privacidad contacto@anteia.co Bogota DC, Colombia 118942 Colombia, Costa Rica, Panama

  • DECISION ENGINE | anteia sas

    | anteia Decision Engine Terminología Beneficios Proceso Configuración Casos de uso Preguntas frecuentes Analytics Api Core ID It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence How does it work? Setting Servicio Configuración Métodos de verificación Se ofrecen diferentes combinaciones de verificación según las necesidades del cliente y basado en las recomendaciones de seguridad en estándares internacionales. Device ID Es posible identificar información del dispositivo en el que el usuario realiza el proceso, como lo puede ser, la versión del celular, la IP, el navegador, y otros elementos para conocer el comportamiento de los firmantes. Diseño visual Se pueden configurar diferentes componentes visuales de la aplicación y otros elementos del proceso para que el usuario sienta familiaridad con la aplicación. Entre los elementos que se pueden modificar están: Logos: Generalmente al principio y al final del proceso de firma. Colores: se pueden escoger colores de fondo, también los colores de los botones principales y secundarios basados en los colores de fondo para mejorar el contraste. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. api Still missing from the document

  • AUTHENTIKATOR | anteia

    Valid Terminología Beneficios Proceso Casos de uso FAQ Analytics Solicita tu DEMO It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. Core ID G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. Solicita tu DEMO

  • SERVICIOS | anteia sas

    Core ID Docs Firma Electrónica Authentikator X-eia Servicios Solicita tu DEMO multiple factors A solid confidence G. lossario La verificación de identidad es el proceso de comprobación y confirmación de los datos e información proporcionados por una persona para determinar si son verdaderos y corresponden a su identidad real. La verificación de múltiples factores o multifactorial es un enfoque más seguro, ya que utiliza varios métodos para confirmar la identidad de una persona, en lugar de solo uno, esto reduce el riesgo de suplantación de identidad y aumenta la confianza en la verificación. Esta verificación es altamente personalizable para asegurar una alta convertibilidad, manteniendo altos niveles de seguridad. Conoce más Docs Servicio de procesamiento de documentos que permite: (1) Creación de documentos como formularios, contratos, pagarés, entre otros. (2) Análisis de texto para extraer información valiosa de los documentos, como datos personales, números, fechas, etc. (3) Clasificación de documentos que da la posibilidad de organizarlos automáticamente según diferentes categorías. (4) Reconocimiento óptico de caracteres (OCR) que permite digitalizar documentos en papel y convertirlos en archivos electrónicos. (5) Monitoreo de incongruencias de información y alertas de riesgo. Conoce más Firma electrónica La firma electrónica es un método digital para asociar a personas autenticadas con documentos digitales válidos. Se utiliza para verificar la identidad del remitente y garantizar la integridad y autenticidad del documento. Se basa en criptografía y tecnologías de seguridad. En el ecosistema de anteia, se realiza una verificación de identidad para asociar la identidad digital del firmante y garantizar la integridad y no repudio del documento. Nuestros métodos de validación incluyen reconocimiento facial y mensajería de texto con códigos de un solo uso, sin embargo, por el uso de la identidad digital, siempre hay una forma de verificar la identidad del firmante. Posee marcas de tiempo certificadas por autoridades confiables y puede ser verificada y almacenada por un largo tiempo. El proceso de firma electrónica requiere que todas las partes involucradas verifiquen su identidad y acepten las condiciones antes de generar el documento final, cumpliendo con las normativas relacionadas e integridad del documento. Conoce más Authentikator Servicio que utiliza técnicas de computer vision, aprendizaje automático y análisis de datos para identificar patrones y tendencias en documentos falsificados, analizar y comparar características visuales de un documento (como texto, imágenes, diseño y formato) con una base de datos de documentos auténticos conocidos. Tiene la capacidad de detectar características falsas o alteradas en un documento y emitir una advertencia o una respuesta si se determina que el documento no es auténtico. Permite adjuntar documentos de identidad, diplomas, facturas, certificados, declaraciones de renta o cualquier otro documento y validar su autenticidad. Convierte documentos no estructurados en estructurados. Convierte imágenes con texto en datos de texto legibles por computadoras. Conoce más x-eia En un Intelligent personal Assistant que ayuda a los usuarios finales a cometer la menor cantidad de errores en su proceso de vinculación, a que puedan resolver problemas rápidamente y mejorar su experiencia de registro. Conoce más Services Authenticated Attachments. Allows you to attach identity documents, diplomas, invoices, certificates, income statements or any other document. Convert unstructured documents to structured to automate large-scale procurement data capture, increase operational efficiencies, improve customer experience, and inform decision-making by speeding and securing processes. Smart Contracts. Legal documents that can be generated automatically, stored securely on a blockchain, and have pre-programmed clauses that are automatically triggered under certain conditions, allowing for greater control and monitoring of the contract lifecycle. This can improve efficiency and security in contract management. Electronic signature. Mechanism that allows a person to be linked to an electronic message, contract or electronic document, identifying himself as a signatory of the message. Provides users with the ability to perform signatures, facilitates the distribution of legally sensitive documents for the collection of electronic signatures. Smart forms. Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. Digital identity. Identity verification information is anonymized to reuse it in future events such as management of forms, contracts or electronic signatures, which allows streamlining processes and guaranteeing the security of information. Decision engine. Run automated decisions based on custom rules as a set of processes. It uses artificial intelligence and analysis to learn and redefine decisions. Dematerialized promissory notes. Mechanism that allows you to sign, fill out and endorse promissory notes supported by dematerialized technology (secure digitization), protected with an advanced electronic signature ensuring its validity. It allows the custody and completion of blank promissory notes for processing, using a secure trace for the parties, verifying the transactions made on the promissory note. Identity verification. Multiple verification factors ensure instantly that customers, employees, suppliers are really who they say they are. Facial and voice biometrics, proof of life, identity document authenticity, GPS, mobile number, Device ID, verification in binding and non-binding lists, search in public and private sources of information and credit history._cc781905-5cde-3194- bb3b-136bad5cf58d_ Solicita tu DEMO

  • DOCS | anteia sas

    Docs Terminologia Magic Forms Beneficios Propiedades Configuración Casos de uso Analytics API Pagarés Beneficios Casos de uso FAQ Analytics API Solicita tu DEMO Core ID Document processing based on artificial intelligence that allows the automation of tasks related to document management. A to analyze and extract information from documents, as well as automatically classify and label them. Tasks that Anteia can automate include data extraction, content verification, and document generation. Anteia's technology is based on a set of machine learning algorithms, which are capable of learning autonomously from previously tagged document examples. This allows GeniusDocs to be able to analyze and understand different types of documents, including invoices, receipts, emails, contracts, and other types of structured and unstructured documents. In addition to its ability to automate document management related tasks, GeniusDocs also offers a number of other benefits. It can help improve the accuracy and speed of document processing, which can significantly reduce operating costs. It can also help improve security and regulatory compliance by enabling automatic detection of sensitive or potentially inappropriate information. G. lossario Document Processing. Automatic document processing to extract relevant information and data. Natural Language Processing (NLP). Technology that allows computers to understand and analyze human language. OCR (Optical Character Recognition). Technology that converts images of text into a digital format. Data extraction. Process of gathering and organizing information from documents. Data integration. Process of combining different data sources to create a more complete and accurate view. Process automation. Use of technology to automate manual tasks and improve efficiency. Machine Learning. Artificial intelligence technique that allows machines to learn and improve from experience. Robotic Process Automation (RPA). Technology that automates repetitive and high-volume tasks through the use of software robots. chatbots. Artificial intelligence applications designed to interact with users through a conversation. Document processing in real time. Automatic document processing that allows obtaining results in real time. Accessibility. Ability of a document to be accessed and used by people with disabilities. Intuitive user interface. Interface that is easy to use and understand for the user. Application integration. Process of connecting different applications so that they work together and share information. predictive analytics Artificial intelligence technique that uses algorithms and models to predict future outcomes. SmartDocument. Electronic document with intelligent features that allow advanced user interaction and automation. Document Automation. Process of creating, editing and sending electronic documents using automated technologies and tools. Document management. Systematic and organized process of creating, storing, retrieving and distributing electronic documents. Interaction with Documents. Process of interacting with electronic documents using specific technologies and tools. OCR (Optical Character Recognition). Technology used to convert scanned images or documents into editable text. Document Storage. Process of saving and storing electronic documents in a secure and accessible manner. Document Editing. Process of modifying and updating electronic documents. Electronic signature. Process of signing electronic documents using specific technologies and tools. Natural Language Processing. Technology used to process and understand natural human language. Machine Learning. Technology used for computers to learn from data and perform tasks without being explicitly programmed. Process Robotics. Technology used to automate repetitive tasks and improve business efficiency. Intelligent Personal Assistant. Technology used to provide personal assistance and solve tasks through conversations with a user. Document Analysis. Process of analyzing electronic documents to extract relevant information. Smart Contracts. Autonomous electronic contracts that are automatically executed and verified without the need for intermediaries. Document Integration. Process of integrating electronic documents into business systems and processes to improve efficiency and productivity. anonymization. Process by which data is processed in such a way that it is not possible to relate it to the identity of a person or their personal data. Despite these processes, it is possible to perform technical and scientific analyzes on that data set. For compliance with anonymization standards, the data must be stripped of sufficient elements so that the owner of the data can no longer be identified, and therefore this data must be processed so that it is not possible to identify a person by using all reasonable means to be used by any other person. Authentication. Although traditionally, authentication processes were related to the originality of documents, in computing they began to be used to verify the identity of people. In other words, to confirm that an individual is who they say they are. To do this, digital authentication relates each user to one or more variables. Usually these variables or factors are classified into three types: by data that people know, such as a password or a PIN. By objects, such as a token, ID card, or SIM card. Or by biometric characteristics of the subjects such as fingerprints. But there are also authentication systems that go a step further and ask for specific actions. Multifactor Authentication. Generally, single-factor authentication systems are more vulnerable, even more so when they depend on passwords chosen by the users themselves. But at the same time, they are the easiest systems to manage given how easy it is to generate and change passwords within an organization. On the other hand, there are biometric systems that are not without risk and that are impossible to change since they are linked to the corporeality of each subject. Fortunately, there is a trend that takes the best of both using two-factor authentication (2FA) and multi-factor authentication (MFA) mechanisms. Authorization. It consists of the security process to determine what actions or services can be performed according to the identity of the users. Biometrics. Application of statistical methods and calculation in the study of biological phenomena. In security it is used as a means to identify, authenticate and control access through measurable human biological data. There are various levels of biometric security with biological measurements (DNA and blood); morphological ones that involve the structure of the body (shape of the face, eyes, etc.) and behavioral ones, those based on actions or patterns such as the tone of the voice or the way of moving. Biometric data is unique to each individual and is one of the best identity confirmation tools. By the way, the term biometrics comes from two Greek words: BIOS(life) and METRON(measurement). Behavioral Biometrics. It is about biometrics based on own actions or behaviors associated with a person. This includes typing pattern (formerly known as keystroke dynamics), tone of voice, use of social media, intensity of heartbeat, and even gait. cybercrime. It is all crime that involves computing devices and networks for carrying out illegal activities. More in detail, is usually used to talk about those activities directed against the confidentiality, integrity and availability of computer systems and networks, as well as the data stored in them. Confidentiality. Initially defined as "what is done or said in the confidence that what is done or said will be kept confidential", today it simply means keeping a secret. This quality in computer terms refers to the fact that the data that is stored on any device and transmitted in any medium should not be exposed to anyone. This reserve of information is enhanced through the use of cryptography. deduplication . Mechanisms used to detect duplicate identities and ensure the uniqueness of people within a system or organization. The tools used in these processes generally include biometric recognition, biographical data, and the use of credentials. Availability. It is the guarantee that a company's IT infrastructure has adequate recovery and protection capacity against system failures, natural disasters or malicious attacks. It is the ability to access and use resources, be it a computer network, a system, an application or data, allowing its use to authorized persons. Face Match. Facial recognition or face matching system through which a user uses his biometric characteristics (his face) to authenticate his identity. This is one of the most used systems thanks to the popularization of smartphones and is frequently associated with the use of mobile applications (apps) and web platforms as a mechanism to keep accounts or transactions safe and secure. Authorized source. Repository, system, or database that contains information about an individual's attributes and is considered to be the primary or most reliable source for this information. When two or more identification systems present a conflict in their data, the authorized source is used as the most secure source of information in this regard. Identity. It is the set of characteristics of an individual, or of a community, that characterize them from others. In security it is used to talk about individuals and the attributes that make them unique. These variables include physical characteristics, personal history, beliefs, cultural, national, and gender factors, among other variables. Digital identity. Just as there is a physical identity, there is also a digital version made up of the unique attributes of each individual that are captured, validated or _cc781905-5cde-3194-bb3b -136bad5cf58d_stored by digital means. ID. It is the action or process of identifying or identifying oneself. Traditionally, this process is linked in the physical world and government agencies with the use of identity documents. On the digital plane, it is usually used to verify that on the other side of the computer, or smartphone, the person who comes into contact is who they say they are. For this purpose, attribute registration processes are used and later, based on the information captured, credentials are issued to optimize the authentication processes. Biometric Identification. It is the process of determining the identity of a person through the use of biometric data such as the shape of the face, the fingerprint or the pattern of walking, among other possibilities. This information is then compared with a database to verify the identity of said user. Despite the use of digital tools for the capture, recording and comparison of data, it must be taken into account that a biometric match is never exact and therefore a 100% match between the biometric template and the user's data will never be presented. As a consequence, margins must be established for the acceptance of matching patterns that obey a category called biometric threshold. Integrity. It refers to the state and accuracy of the data involved in a process. In other words, integrity requires that the data received must be exactly the same as the data sent. performance metrics. They are measurement systems used to determine the precision of the authentication processes. In biometrics the following stand out: False Acceptance Rate (FAR). The False Acceptance Rate or FAR is sometimes known as the False Negative Rate or FN. As its name indicates, it is related to unregistered users who, despite them, are erroneously admitted to the systems. False rejection rate (FRR). It is sometimes known as the false positive rate or FP. It is the opposite case of the FAR and occurs when the system denies access to an authorized user. Biometric recognition. Procedure, through the use of technological devices, to confirm the identity of people by comparing biological and behavioral attributes. Face recognition. Facial recognition is the use of technology to verify the identity of a user by comparing their facial attributes with a digitally stored database. Despite not being the most accurate identification method, of all the biometrics, it has become popular due to its ease of use. Its operation is based on the registration of the facial structure, using the distances between the center of the pupils in the eyes, the nose, the mouth and the edges of the jaw. These variables are stored using algorithms that protect the information and optimize it for later comparison. cyber security. Cybersecurity is the combination of people, policies, processes and technologies used by a company to protect its digital assets. There are various classifications ranging from security of the Internet of Things (IoT), to information security, among other classifications. Some of the most common threats are ransomware, malware, denial of service attacks, and phishing. Its use has changed its motives, and sides, from its beginnings, from being a tool for extortion and industrial espionage, to the sabotage of entire nations in conflict and a tool for cyber-activists. Identification system. It is about the set of practices, equipment, technological infrastructure, software, credentials and laws involved in the capture, management and use of personal identification data. Digital identification system. It is a technological platform used during the life cycle of an organization's identity. It covers from the capture, validation, storage and transfer of data, to the management of credentials, for their subsequent verification and authorization de identities. Error rate. No matter how sophisticated the technological equipment used in biometrics may be, there will always be a margin of error. For this reason, in biometrics we speak of a biometric threshold that must be established using false acceptance rate (FAR) and false rejection rate (FRR) variables. In this way, if the biometric threshold is at a low value, few rejections will be generated, which is equivalent to a low FRR and a greater risk of imitators. To avoid this, the FRR is increased, which will also decrease the FAR. check . For the context of information technology and security, it is defined as the process of confirming the identity of a user or process by comparing their attributes or credentials to facilitate their authorization and access to services. Biometric verification. It is the verification process using biometric attributes for this purpose. With this objective, a capture of these variables is carried out, whose information is compared with a digitally stored biometric template. multiple factors A solid confidence Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Benefits Digitize forms in seconds. They allow organizations to efficiently collect user data by integrating with existing databases and workflows. Provides companies with authentic user information, minimizing the risk of fraud. The information compiled in these documents is periodically updated and verified. Eliminate human typing errors. Automate reports that improve customer knowledge. Increase end customer satisfaction by freeing them from the stressful processes of managing multiple forms with the same information over and over again. Promptly alert fraud risks or eventualities in compliance compliance. Eliminate transaction limits, annoying authentication steps, and false declines. It doesn't let document failures and device changes stop customers. They minimize fraud. Maximize conversion. It improves the user experience by being self-managing, avoiding filling out large amounts of information. Properties Face Propiedad Servicios Tecnología 1 Digitalización de formulario lleno. Recibir documento en formato PDF. Automatización de lectura de datos. Almacenamiento de datos. Consulta de datos. Ajustes manuales. Notificar estado del proceso. Se recibe el archivo PDF del cliente por medio del API. Se extrae el texto. Se almacenan los datos del PDF. El cliente puede acceder a través de un API a los datos recolectados del documento. Anteia desea hacer correcciones con respecto a la base de datos. Notificar por medio de webhook el estado de un archivo. 2 Digitalización de un formulario vacío. Recibir documento en formato PDF o Excel (No jpg o png). Automatización esquematización. Almacenamiento de esquema. Ajustes manuales. Verificación del formulario. Se extrae el texto. Interpretar requerimiento. Se almacena el esquema del formulario. Anteia desea hacer correcciones con respecto a la base de datos. Corroborar estado. Corregir datos. Back office 3 Interfaz de usuario. FrontEnd Que se pueda interpretar el esquema para dibujar las preguntas. Guardar la información del formulario llenado . Properties Servicio Configuración Campos del formulario Nro. De páginas. Tipos de campos. Qué campos van en cada página. Etiquetas de los campos. Condicionales. Contenido de los campos. Autocarga de los campos. Validaciones de la información ingresada. Campos autocalculados. Alertas por el valor de los campos Por cada campo se pueden definir una lista de valores, para los cuales dicho campo puede generar una alerta. Campos mapeados El valor de un campo puede ser cargado a partir del valor de otro campo. Ejemplo. Si se tiene una actividad económica, en otro campo se puede autocompletar el CIIU. Use cases Promissory notes issued by financing institutions to guarantee the payment of loans. Issued by banks or financial institutions. Used to finance short-term business transactions. For personal loans online. By leasing companies to finance the acquisition of property. Guarantee payment of invoices. Promissory notes issued by educational institutions to finance the education of students. Used in the stock market to back corporate bonds. Issued by companies to finance capital projects. Issued by insurance companies to support insurance policies. Promissory notes issued by factoring companies to finance the obtaining of invoices. By brokerage institutions to guarantee the payment of commercial transactions. Frequent questions Does it have the same validity as a traditional promissory note? If, due to the principle of functional equivalence and being a document that is born digitally, it meets all the conditions of a traditional promissory note What are the issuance requirements? The same as any legal document, to be signed a method must be generated that associates the debtor with this document, through verifiable systems of non-repudiation, authenticity and integrity of the document. The regulations regarding the promissory note fall especially on the transfer and custody of the documents. How is it transferred? There is a process called endorsement, which allows the promissory note to be transferred as a security, so that the endorser transfers ownership of the document and his obligation to the endorsee. In our system, this process happens in a completely virtual way, since we verify the identity of the endorsee to make a successful transfer, the result of which is the transfer of ownership of the document in our system. How can you negotiate? The negotiation of the promissory note is outside the system, because like other securities, it can be traded, we allow this trade by providing the client with the functionality of endorsing a promissory note. Who can issue a dematerialized promissory note? Due to the principle of functional equivalence, anyone can issue a promissory note, however, it is important that this promissory note is signed and that it is kept in such a way that the integrity of the document and the identity of the debtor can be verified, which is why systems like ours are They are in charge of guarding the promissory note during its life cycle, from creation and signing, to processing or endorsement and gives clients the power to manage it, making the process easier and safer, both for clients and for debtors. What are the differences between a dematerialized promissory note and a traditional promissory note? The dematerialized promissory note is a representation of the traditional promissory note, which allows the same actions to be performed on the document, only that it is born and is maintained in the digital world, which brings advantages of storage, administration, signature and even agility in the life cycle of a promissory note What are the risks associated with dematerialized promissory notes? Security risk. As they are electronic documents, dematerialized promissory notes are exposed to the possibility of hacking, identity theft and other computer crimes. Default risk. As with traditional notes, if the issuer of the note fails to meet its payment obligation, the investor may lose some or all of their investment. Liquidity risk. As with traditional promissory notes, dematerialized promissory notes may have a lower degree of liquidity than other financial instruments or securities, which may make it difficult to negotiate or sell them in the secondary market. In general, the risks associated with dematerialized promissory notes originate from the use of computer technologies or derive from risks associated with any type of promissory note. What security does a dematerialized promissory note offer? Depending on the way it was issued, it can generate many advantages, the traceability of the document is protected and difficult to break. The verification of the identity of the debtor or debtors allows for more reliability, the custody of the document allows it not to be lost or document mismanagement. Finally, the integrity of the associated documents ensures that the changes made are verified and does not allow unauthorized modifications. What are the costs associated with dematerialized promissory notes? The costs relate to maintaining the promissory note, by which we mean custody as well as administration, and signing associated documents, which utilize identity verification. How can you collect a dematerialized promissory note? Due to the principle of functional equivalence, in the same way as a traditional promissory note, if the debtor is not willing to pay the obligation, the documentation is generated digitally and the creditor can demand payment in court, because the documentation is sufficient evidence to show that the debtor accepted the obligation. What happens if the debtor does not pay a dematerialized promissory note? The creditor can demand payment in a lawsuit, forcing him to pay the debt associated with the promissory note, the only difference with a traditional promissory note is the use of digital documents as evidence of such obligation. Regulation Argentina: The regulation on dematerialized promissory notes in Argentina is governed by Securities Law No. 22,415 and by the National Securities Commission. The law establishes the requirements for the issuance, negotiation and transfer of securities, including dematerialized promissory notes. Brazil: The regulation on dematerialized promissory notes in Brazil is governed by the Brazilian Securities and Exchange Commission (CVM) and by the Securities Market Law No. 6,385/76. The CVM is responsible for regulating and supervising the securities market in Brazil, including dematerialized promissory notes. The law establishes the requirements for the issuance, negotiation and transfer of securities, as well as the obligations of issuers of securities. Mexico: The regulation on dematerialized promissory notes in Mexico is regulated by the Mexican Social Security Institute (IMSS) and the National Banking and Securities Commission (CNBV). The CNBV is responsible for regulating and supervising the securities market in Mexico, including dematerialized promissory notes. The IMSS is responsible for regulating and supervising the issuance of securities, including dematerialized promissory notes. Colombia: The regulation on dematerialized promissory notes in Colombia is regulated by the Financial Superintendence of Colombia. The Superintendency is responsible for regulating and supervising the financial market in Colombia, including the stock market and the issuance of dematerialized promissory notes. Costa Rica: The regulation on dematerialized promissory notes is regulated by the Central Bank of Costa Rica and the General Superintendence of Securities. The Central Bank is responsible for regulating and supervising the monetary and financial market in Costa Rica, including the stock market. The General Securities Superintendency is responsible for regulating and supervising the issuance and trading of securities, including dematerialized promissory notes. It is important to note that regulations may vary over time and it is advisable to check current laws and regulations before issuing or negotiating dematerialized promissory notes in Costa Rica. Peru: The regulation on dematerialized promissory notes in Peru is regulated by the Superintendence of Banking, Insurance and AFP. The Superintendency is responsible for regulating and supervising the financial market in Peru, including the stock market and the issuance of dematerialized promissory notes. Chile: the regulation on dematerialized promissory notes is regulated by the Superintendency of Securities and Insurance. The Superintendency is responsible for regulating and supervising the stock market and ensuring the protection of investors and the integrity of the stock market in the country. Ecuador: The regulation on dematerialized promissory notes is regulated by the Central Bank of Ecuador and the Superintendence of Companies. The Central Bank is responsible for regulating and supervising the monetary and financial market in Ecuador, including the stock market. The Superintendency of Companies is responsible for regulating and supervising the issuance and trading of securities, including dematerialized promissory notes. Panama: The regulation on dematerialized promissory notes is regulated by the Superintendency of the Stock Market. The Superintendency is responsible for regulating and supervising the securities market in Panama, including the issuance and trading of securities, including dematerialized promissory notes. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Magic Shapes Digital forms that are self-managed thanks to public and private sources of information, Optical Character Recognition (OCR), Intelligent character recognition (ICR) and other forms or documents from the same user. The authenticity of information is verified, updated and monitored through compliance alerts, dates and inconsistencies. It allows you to attach documents, images, PDFs and other types of formats. Solicita tu DEMO

  • Política de privacidad | anteia

    Core ID Nuestro objetivo es informarte de la manera más sencilla sobre nuestra Política de Tratamiento de Datos. Si tienes cualquier duda, nuestros canales de comunicación están disponibles en todo momento. 1. ¿Quiénes somos? anteia, es una empresa especializada que, por medio de su plataforma, brinda a los usuarios un sistema de verificación de identidad de la persona mediante herramientas digitales que se encargan de identificar y verificar la autenticidad del Usuario Final con base en su huella (biometría, voz, cara), para la celebración de contratos inteligente por medio de firma electrónicas. Esta política describe nuestras prácticas de privacidad, se establecen las finalidades, alcance, medidas y procedimientos de los sistemas que tengan relación directa con los datos personales que anteia llegue a conocer del Usuario Final, con el fin de realizar el objeto y el tratamiento de datos que ha contratado el Cliente, así como los mecanismos con que los titulares cuentan para conocer, actualizar, rectificar o suprimir los datos suministrados, o revocar la autorización que se otorga con la aceptación de la presente Política. anteia adopta y hace público a todos los interesados la presente política, la cual contiene los lineamientos y elementos esenciales para el cumplimiento de las leyes territoriales sobre protección de datos de donde se suscriba la autorización a dicho tratamiento. 2.Definiciones Para efectos e interpretación de esta Política, de las obligaciones de anteia así como de las obligaciones y derechos de los Titulares, los términos que se señalan a continuación tendrán los siguientes significados: Autorización: Consentimiento previo, expreso e informado del Titular para el Tratamiento de los datos personales, de acuerdo con las finalidades y en los términos de esta Política de Privacidad y de Protección de Datos Personales. Aviso de privacidad: Comunicación verbal o escrita a través de la cual el Responsable del tratamiento de datos informa al Titular acerca de la existencia de la Política de Privacidad que le aplica, la forma de acceder a la misma y las finalidades del Tratamiento que se pretende dar a los datos personales. El aviso de privacidad es utilizado únicamente en caso de no ser posible poner a tu disposición la Política de Privacidad. Base de Datos: Conjunto organizado de datos personales que es objeto de Tratamiento. Canales para ejercer derechos: Medios de recepción y atención de peticiones, consultas y reclamos que el Responsable y/o el Encargado del Tratamiento ponen a disposición de los Titulares de los datos para que este ejerza sus derechos. Dato biométrico: Son los rasgos biológicos o físicos que permiten identificar a una persona como única frente al resto de la población; son datos biométricos entre otros, la huella dactilar, los rasgos faciales, el patrón del iris del ojo, el tono o timbre de voz. Dato personal: Son aquellos que permiten identificar a una persona, por ejemplo, el nombre, teléfono, cédula, etc. Dato semiprivado: Dato que no tiene naturaleza íntima, reservada, ni pública y cuyo conocimiento o divulgación puede interesar a su titular y a cierto sector o grupo de personas o a la sociedad en general. Dato público: Son aquellos datos que no estén clasificados en las otras categorías, por lo que se considera residual, es decir que no sean semiprivados, privados o sensibles. Estos conciernen a un interés general, tales como los documentos públicos, sentencia judicial, los relativos al estado civil de las personas, entre otros. Dato sensible: Son aquellos datos sólo relevantes para su Titular, de naturaleza reservada y por lo cual, primordialmente protegidos de un potencial trato marginal o discriminatorio, y que perturben la dignidad del afectado o titular. Información pública: Es toda información que un sujeto obligado genere, obtenga, adquiera, o controle en su calidad de tal. Información pública clasificada: Es aquella información que estando en poder o custodia de un sujeto obligado en su calidad de tal, pertenece al ámbito propio, particular y privado o semiprivado de una persona natural o jurídica por lo que su acceso podrá ser negado o exceptuado, siempre que se trate de las circunstancias legítimas y necesarias y los derechos particulares o privados. Responsable del Tratamiento: Persona natural o jurídica, pública o privada, que por sí misma o en asocio con otros, decide sobre la base de datos y/o el Tratamiento de los datos. Encargado del Tratamiento: Persona natural o jurídica, pública o privada, que por sí misma o en asocio con otros, realiza el Tratamiento de datos personales por cuenta del Responsable del Tratamiento y siguiendo sus instrucciones. Titular: Persona natural cuyos datos personales son objeto de Tratamiento. Tratamiento: Cualquier operación o conjunto de operaciones sobre datos personales, tales como la recolección, almacenamiento, uso, circulación o supresión. Cliente: Persona natural o jurídica, pública o privada, que tiene su propia política de Privacidad y acude a los servicios de anteia para poder verificar sus propios clientes, quien será el responsable del tratamiento del dato, del almacenamiento y la seguridad del mismo y que denominaran la presente política y condiciones de anteia como el usuario final. Usuario final: Aquella persona que por disposición del Cliente utiliza los servicios contratados por este con anteia. Operador: Se denomina operador de información a la persona, entidad u organización que recibe de la fuente datos personales sobre varios titulares de la información, los administra y los pone en conocimiento de los usuarios bajo los parámetros de la ley. Fuente de datos: La fuente de información es la persona, entidad u organización que recibe o conoce datos personales de los titulares de la información, en virtud de una relación comercial o de servicio o de cualquier otra índole y que, en razón de autorización legal o del titular, suministra esos datos a un operador de información, el que a su vez los entregará al usuario final. Transferencia: La transferencia de datos tiene lugar, cuando el Responsable y/o Encargado del Tratamiento de datos personales envía la información o los datos personales a un receptor, que a su vez es Responsable del Tratamiento y se encuentra en el mismo país o en otra ubicación geográfica. Transmisión: Tratamiento de datos personales que implica la comunicación de los mismos dentro o fuera de un territorio, con el fin de que el Encargado realice el Tratamiento por cuenta del Responsable. anteia ASISTENTE INTELIGENTE: - Sistema Inteligente que a través del video (computación cognitiva) logra que el proceso de compras, contratación y vinculación sea más confiable, sencillo y seguro. 3. Principios de Tratamiento de los Datos Personales Durante el tratamiento de sus datos personales anteia observará en todo momento lo siguientes principios: Principio de acceso y circulación restringida: El Tratamiento se sujeta a los límites que se derivan de la naturaleza de los datos personales y las autorizaciones dadas por el titular, así como a las disposiciones de la presente Política, de la Ley Territorial donde se realice el tratamiento de los datos. El Tratamiento sólo podrá hacerse por personas autorizadas por el Titular y/o por las personas previstas por ley. Principio de confidencialidad: Todas las personas que intervengan en el Tratamiento de datos personales, cuando estos datos no tengan la naturaleza de públicos, están obligadas a garantizar la reserva de la información, inclusive después de finalizada su relación con alguna de las labores que comprende el Tratamiento, pudiendo sólo suministrar o comunicar los datos personales cuando ello corresponda al desarrollo de las actividades autorizadas en la Ley Territorial donde se realice el tratamiento de los datos. Principio de Finalidad: el Tratamiento obedecerá a una finalidad legítima, y la finalidad declarada, determinada y explícita que hizo el titular del dato en la autorización expresa para su tratamiento. Principio de Libertad: el Tratamiento sólo podrá ejercerse con el consentimiento, previo, expreso e informado del Titular. Los Datos Personales no serán obtenidos o divulgados sin previa autorización, o en ausencia de mandato legal o judicial que releve el consentimiento del Titular. Principio de proporcionalidad: anteia se compromete a tratar únicamente los datos personales que resulten adecuados, pertinentes y limitados al mínimo necesario con relación a las finalidades que justifican su tratamiento de acuerdo con la autorización debidamente otorgada. Principio de seguridad: anteia como Responsable y/o encargada del Tratamiento de datos de carácter personal y sensible, proporcionará las medidas técnicas, humanas y administrativas necesarias para dar seguridad a los registros de datos personales, evitando su adulteración, pérdida, consulta, uso o acceso no autorizado o fraudulento. Principio de Veracidad o Calidad: La información sujeta a Tratamiento será veraz, completa, exacta, actualizada, comprobable y comprensible, el titular podrá conocer, actualizar y rectificar la información recogida en bases de datos y los demás derechos, libertades y garantías a que se refieren las leyes territoriales sobre protección de datos de donde se suscriba la autorización a dicho tratamiento. Principio de máxima publicidad para titular universal: Toda información en posesión, bajo control o custodia de un sujeto obligado es pública y no podrá ser reservada o limitada sino por disposición legal. 4. Datos sensibles anteia reconoce el carácter facultativo de la respuesta a las preguntas que versen sobre datos sensibles, por lo cual, en los casos en que trate los datos de manera temporal, está comprometido en proteger sus datos personales, sensibles, su privacidad y su seguridad. Para lo anterior, contamos con un equipo técnico de privacidad, altamente cualificado, que se compromete a proteger todos los datos personales y sensibles recopilados en cada uno de los servicios que prestamos y garantizar que los mismos sean manejados conforme las leyes territoriales de donde se realice el tratamiento de los datos, y la presente política, garantizando especialmente el derecho a la protección de los datos personales. 5. Datos Biométricos anteia podrá recolectar información personal biométrica (como huellas, fotografías del rostro selfie, iris, cadencias, voz, firma, reconocimiento facial, rasgos morfológicos entre otros), en adelante “Datos Biométricos” con el fin de permitir la identificación de los Usuarios y/o Titulares, conforme a los parámetros de seguridad establecidos en la regulación donde se tratan los datos, las buenas prácticas y las señaladas por las autoridades. 6. Derechos de los Titulares a. Conocer, actualizar y rectificar sus datos personales frente a los Responsables del Tratamiento o Encargados del Tratamiento. Este derecho se podrá ejercer, entre otros frente a datos parciales, inexactos, incompletos, fraccionados, que induzcan a error, o aquellos cuyo Tratamiento esté expresamente prohibido o no haya sido autorizado; b. Solicitar prueba de la autorización otorgada al Responsable del Tratamiento salvo cuando expresamente se exceptúe como requisito para el Tratamiento. c. Presentar quejas ante la respectiva autoridad competente por infracciones a las leyes que regulen la protección y tratamiento de datos y las demás normas que la modifiquen, adicionen o complementen; d. Revocar la autorización y/o solicitar la supresión del dato cuando en el Tratamiento no se respeten los principios, derechos y garantías constitucionales o legales o bien a voluntad del titular del dato que no desee que su dato continúe siendo tratado por la compañía, salvo que su dato deba seguir siendo tratado en virtud de la Ley u orden judicial, caso en el cual se le informará respectivamente al titular. La revocatoria y/o supresión procederá cuando la autoridad competente respectiva haya determinado que en el Tratamiento el Responsable o Encargado han incurrido en conductas contrarias a la Ley de protección de datos del territorio donde se realice el tratamiento. e. Acceder en forma gratuita a sus datos personales que hayan sido objeto de Tratamiento; 7. Obligaciones de anteia a. Informar al Cliente que por tratarse de datos sensibles debe notificarle al usuario final que este último no está obligado a autorizar su Tratamiento, llegado el caso, que el usuario final no otorgue la autorización del tratamiento de sus datos, anteia no podrá realizar la autenticación de la identidad del mismo. b. En el caso de que el Cliente actúe como responsable del tratamiento, anteia solicitará al Cliente que informe al titular de forma explícita y previa, que de forma directa o por intermedio de terceros se tratarán datos de forma permanente o temporal y por lo cual, si el Usuario Final está de acuerdo, dará su consentimiento expreso. De igual manera, anteia podrá solicitárselo al Usuario Final, con instrucción expresa del Cliente. c. En el caso de que el Cliente actúe como responsable del tratamiento, anteia velar por tratar de manera temporal y como encargado los datos conforme los estándares regulatorios más altos a nivel mundial. d. En el caso de que anteia actúe como responsable del tratamiento, solicitará directamente al Usuario Final la autorización del tratamiento de los datos y velará por tratar los mismos conforme los estándares regulatorios más altos a nivel mundial. 8. Finalidades del Tratamiento de la Información Personal e Información Personal Sensible El Tratamiento de datos personales que anteia realiza obedece a una finalidad legítima y a su objeto social, finalidad determinada, explícita y legítima que será autorizada de forma expresa por el titular del dato, para lo cual, anteia cuenta con tres (3) sistemas de los cuales, cada uno cuenta con la autorización y se expresa de forma clara la finalidad de dicho tratamiento. En el caso en que anteia actúe como encargado temporal de los datos: La información del titular del dato recolectado y tratado de manera temporal por anteia, se circunscribirá al desarrollo del objeto social de anteia y al servicio usado por el Usuario Final y conforme le informe el Cliente. Lo anterior, conforme la finalidad contenida en la autorización suscrita por el titular. En el caso en que anteia actúe como encargado de los datos: La información del titular del dato recolectado y tratado de manera temporal por anteia, se circunscribirá al desarrollo del objeto social de anteia y al servicio usado por el Usuario Final, de acuerdo con lo que le informe el Cliente, conforme la finalidad contenida en la autorización suscrita por el titular. En el caso en que anteia actúe como responsable de los datos: La información del titular del dato recolectado y tratado por anteia se circunscribirá al desarrollo del objeto social de anteia y al servicio usado por el Usuario Final, conforme la finalidad contenida en la autorización suscrita por el titular. Los datos sensibles, semiprivados y privados que sean recopilados durante el uso de las plataformas de anteia y/o terceros, podrán ser usados con fines estadísticos, científicos, para generar análisis, proyecciones, mejorar la experiencia del usuario u otra información de valor; sin embargo, estos serán tratados como datos desligados del titular del dato y no se entenderá como que anteia conserva la base de datos del cliente, ya que ha procedió a anonimizarlo en su calidad de encargado. 9. Finalidades especiales de la Información Personal e Información Personal El Tratamiento de datos personales que anteia realiza obedece a una finalidad legítima y a su objeto social, por tanto, a los datos personales y sensibles suministrados a anteia tendrán las siguientes finalidades especiales: Para la correcta ejecución del contrato suscrito entre el Cliente y/o Titular y anteia. Creación de la cuenta para el acceso a los servicios prestados por anteia. Completar la información del perfil para acceder a la plataforma o back Office de anteia. Verificación de identidad del Titular, con el uso del documento de identidad vigente que sirva para acreditar la identidad del mismo. Creación de la identidad digital del Titular. Obtener información del Titular de otras fuentes para compararla con la que anteia recopila. Verificación de los datos contenidos en el documento de identidad y de la biometría facial del Titular ante la entidad competente, con la finalidad de corroborar que el documento de identidad presentado para los trámites y/o servicios sea autentico y corresponda con el registrado en la base de datos de la entidad competente. Revisión del historial de antecedentes policiales, penales y judiciales del Titular. Consulta de listas restrictivas internacionales y nacionales para prevenir y administrar riesgos de lavados de activos, financiación del terrorismo, LAFT en el marco del cumplimiento del SIPLAFT, SARLAFT, SARO y SAGRILAFT, para detección y prevención de fraude y cuestiones de seguridad. Recopilación y almacenamiento de resultados de la consulta de antecedentes penales, judiciales o advertencias sobre fraude para la verificación de la identidad a efectos del compromiso de anteia con la prevención de prácticas fraudulentas y evaluación de riesgos. Recepción de información acerca del Titular, de sus actividades dentro y fuera de la Plataforma de anteia a través de aliados de este o información acerca de las experiencias y las interacciones que el Titular haya tenido a través de anunciantes aliados. Facturación y demás efectos tributarios, en cuyo caso será compartida con la autoridad competente de cada país, encargadas de desarrollar dicha labor. Procesamiento de pago sobre los servicios adquiridos por el Titular. Recopilación de los servicios que utilizan los Titulares y la forma en que la que hacen uso de estos. Mejora de las iniciativas comerciales y promocionales de anteia, así como el análisis de las paginas visitadas y las búsquedas realizadas por los Titulares, para mejora de la oferta de contenidos y artículos, personalización de estos contenidos, su presentación y servicios de anteia. Envío de información por medio mensajes de texto y/o correos electrónicos suministrados por el Titular, sobre los servicios, modificaciones de estos o de sus tarifas, recordatorios de pago, promociones, eventos e información de interés para los Titulares en general. Análisis de la información personal por parte de anteia, sus accionistas, vinculadas y/ relacionadas, y terceros contratados para el desarrollo y promoción de la venta de los servicios prestados por anteia. Consultar el comportamiento crediticio, financiero y comercial del Titular a las centrales de información financiera y/o a quien represente sus derechos y a cualquier otra base de datos o cualquier otra entidad autorizada, la información personal, sensible, confidencial que resulte de todas las operaciones directa o indirectamente del contrato, así como, el incumplimiento de obligaciones. 10. Tratamiento de Datos Personales Tratamiento de datos. anteia tratará los datos públicos de los titulares de conformidad con la finalidad para la cual es capturada dicha información, tomando las medidas necesarias que garanticen el cumplimiento de los principios y obligaciones legales respectivas. Tratamiento de datos sensibles. anteia solo tratará datos personales sensibles en aquellos casos que sea estrictamente necesario, para lo cual solicitará la autorización previa y expresa al titular del dato e informándoles sobre la finalidad específica del Tratamiento. Parágrafo: anteia solo almacenará los datos personales del Usuario Final cuando este quede expreso en la autorización del tratamiento de datos. 11. Clasificación de las Bases de Datos anteia ha clasificado sus Bases de Datos de la siguiente manera: Bases de datos de Clientes. Corresponde a las bases de datos manuales y/o automatizadas, que contienen datos de naturaleza pública y privada de personas jurídicas o naturales, con las cuales se mantiene un vínculo contractual y/o comercial en el desarrollo propio del objeto social de anteia. Esta base de datos podrá contener datos personales autorizadas por el titular y los cuales tienen como finalidad el cumplimiento, la ejecución y el desarrollo de las relaciones contractuales y el envío de material publicitario, información de eventos o servicios que ofrece la compañía. El Tratamiento de estos datos para fines diferentes al desarrollo y ejecución de la relación contractual o el cumplimiento de deberes de carácter legal, requerirá de autorización previa del titular. Bases de datos de Proveedores. Son las bases de datos manuales y/o automatizadas que contienen datos personales de titulares con quienes existe un vínculo contractual y/o comercial entre anteia y el titular del dato y cuyo Tratamiento tiene como finalidad cumplir con las obligaciones contractuales y legales. Bases de datos Laborales. Son las bases de datos manuales y/o automatizadas que contienen datos de titulares que se presentan como candidatos, o se vinculan laboralmente con anteia, o son extrabajadores de anteia, y cuyo Tratamiento tiene como finalidad la identificación del titular para cumplir con las disposiciones legales y reglamentarias. Esta base de datos incorpora información privada, pública, datos sensibles y de menores. El Tratamiento de los datos personales para los fines diferentes al cumplimiento de las obligaciones derivadas de la relación laboral requerirá autorización previa del titular o su Representante Legal, según sea el caso. En ningún caso, anteia dará Tratamiento a los datos sensibles o de menores sin autorización previa. anteia, realizará el Tratamiento de los Datos Personales de los Candidatos para efectos de determinar si estos califican al perfil de un cargo a ser ocupado, previa realización de un proceso de selección, para verificar la calidad de la información suministrada por el candidato y la autenticidad de la misma y para almacenar los datos con la finalidad de ser usados en futuros procesos de selección. 12. ¿Qué información solicita anteia? anteia para el cumplimiento de su objeto y conforme lo expuesto en la presente política solicita la siguiente información: Nombre del titular completo. Número de Identificación de identificación (cédula de ciudadanía, cédula de extranjería o cualquier otro ID) Datos biométricos e imagen personal. Dirección física. Correo electrónico. Celular. Consulta de Antecedentes (judiciales, penales, policivos, fiscales, procuraduría, contraloría y listas restrictivas) Consulta de procesos judiciales y penales. anteia se reserva el derecho a solicitar datos distintos a los mencionados y en dicho caso, informará de forma clara al Cliente y/o Usuario Final la finalidad del tratamiento de datos solicitados. 13. Seguridad e integridad de la información Durante el tiempo que anteia requiere la información personal y sensible de los Usuario Finales y conforme lo establece en su manual de gestión de la política de privacidad y de seguridad de la información, provee todos los mecanismos de seguridad al momento de tratar datos. anteia emplea herramientas como cortafuegos y cifrado de datos. Así mismo, en los casos que anteia en los casos que corresponda almacene los datos personales y sensibles, conforme lo establece en su manual de gestión de la política de privacidad, y de seguridad de la información. También exigimos se utilicen los diferentes mecanismos de autenticación de la identidad cada vez que acceda a su cuenta en línea. 14. anteia como responsable del Tratamiento de los Datos Personales y sensibles anteia está comprometida a cumplir con los deberes impuestos por la ley, por lo cual, debe obrar de tal forma que cumpla con las siguientes obligaciones: Garantizar al Usuario Final, en todo tiempo, el pleno y efectivo ejercicio del derecho de conocer, actualizar o rectificar sus Datos Personales. Solicitar y conservar, en condiciones previstas en esta Política, copia de la respectiva autorización otorgada por el Usuario Final. Informar de manera clara y suficiente al Usuario Final sobre la fidelidad de la recolección y los derechos que le asisten por virtud de la autorización otorgada. Informar a solicitud del Usuario Final sobre el uso dado a sus Datos personales. Tramitar las consultas y reclamos formulados en los términos señalados en la presente Política. 15. anteia como encargado del Tratamiento de los Datos Personales y sensibles anteia realiza el Tratamiento de Datos en nombre de otra entidad u organización (Responsable del Tratamiento) como encargado o mandatario o figura equivalente, por lo cual deberá cumplir los siguiente deberes: Garantizar al Titular, en todo tiempo, el pleno y efectivo ejercicio del derecho de hábeas data. Conservar la información bajo las condiciones de seguridad necesarias para impedir su adulteración, pérdida, consulta, uso o acceso no autorizado o fraudulento. Realizar oportunamente la actualización, rectificación o supresión de los datos. Actualizar la información reportada por los Responsables del Tratamiento dentro de los cinco (5) días hábiles siguientes contados a partir de su recibo; conforme a las leyes territoriales donde se realice el tratamiento de los datos. Abstenerse de circular información que esté siendo controvertida por el Titular y cuyo Bloqueo haya sido ordenado por las autoridades judiciales o entidades de control. Permitir acceso a la información únicamente a las personas autorizadas por el Titular o facultadas por la ley territorial de donde se realice el tratamiento de los datos para dicho efecto. Informar a las entidades de control y/o autoridades judiciales cuando se presenten violaciones a los Códigos de seguridad y existan riesgos en la administración de la información de los Titulares. En dicho caso, anteia tratará los datos del Usuario Final conforme a los estándares regulatorios más altos a nivel mundial y proveerá todos los mecanismos de seguridad para el almacenamiento de los datos. 16. anteia como encargado temporal del Tratamiento de los Datos Personales y sensibles anteia realiza el Tratamiento de Datos en nombre de otra entidad u organización (Responsable del Tratamiento) como encargado o mandatario temporal o figura equivalente, por lo cual no almacenará el dato y deberá cumplir los siguiente deberes: Garantizar al Titular, en todo tiempo, el pleno y efectivo ejercicio del derecho de hábeas data. Conservar la información bajo los parámetros de la anonimización. Actualizar la información reportada por los Responsables del Tratamiento dentro de los cinco (5) días hábiles siguientes contados a partir de su recibo; conforme a las leyes territoriales donde se realice el tratamiento de los datos. Abstenerse de circular información que esté siendo controvertida por el Titular y cuyo Bloqueo haya sido ordenado por las autoridades judiciales o entidades de control. Permitir acceso a la información únicamente a las personas autorizadas por el Titular o facultadas por la ley territorial de donde se realice el tratamiento de los datos para dicho efecto. Informar a las entidades de control y/o autoridades judiciales cuando se presenten violaciones a los Códigos de seguridad y existan riesgos en la administración de la información de los Titulares. En dicho caso, anteia tratará temporalmente los datos del Usuario Final hasta tantos se anonimice el dato recolectado y la base sea entregada al Cliente, conforme a los estándares regulatorios más altos a nivel mundial. 17. Cookies Las cookies son archivos de datos (no códigos) creados y enviados por un sitio web y almacenados en el navegador del usuario. De esta forma, el sitio web puede consultar la actividad previa del navegador. Una cookie no puede borrar ni leer información del ordenador del titular de los datos, ni tampoco identificar a una persona, sino que reconoce una combinación de computación-navegador-usuario. Las cookies tienen distintas funciones de acuerdo con la finalidad para la cual se usan, existen las cookies publicitarias, de funcionalidad o personalización, aquellas estrictamente técnicas, cookies de análisis y de publicidad comportamental. Las cookies son parte fundamental del funcionamiento del Sistema Inteligente, el objetivo principal de estas es mejorar la experiencia del usuario, para que esta se más cómoda y eficiente, sin embargo, anteia no utilizar cookies con fines comerciales, no para realizar publicidad ni para transferir cookies a terceros. 18. Autorización para Tratamientos de datos anteia solicitará, previamente al Tratamiento de los datos, al titular del dato la autorización para el Tratamiento de datos personales por cualquier medio, físico o electrónico, que permita ser utilizado como prueba de la autorización. La autorización contendrá como mínimo la siguiente información: El Tratamiento al que serán sometidos los datos personales y la finalidad específica del mismo. El tiempo por el cual serán tratados sus datos personales. Los derechos que le asisten como Titular. La página web, correo electrónico, dirección física y demás canales de comunicación por los cuales podrá formular consultas y/o reclamos ante anteia. anteia conservará las autorizaciones obtenidas en forma física o electrónica garantizando su consulta posterior. En caso de que se realice el tratamiento de datos sensibles o de niños y adolescentes se informará por parte de anteia el carácter de sensible que posee este tipo de información y se le dará la opción al titular de responder. 19. Peticiones, consultas o reclamos. Para efectos del ejercicio de los derechos del titular a conocer, actualizar, rectificar, y suprimir los datos personales que haya suministrado a El Cliente, este podrá contactar a El Cliente a través de los datos de notificación dispuestos por el mismo en su Política de Privacidad. A fin de interponer peticiones, consultas o reclamos subsidiarios a los presentados directamente al Cliente o frente a la autenticación de la identidad del titular de los datos, podrá contactar a anteia a través del correo electrónico pqr@anteia.co . En dicha comunicación, el titular deberá indicar la petición o derecho que se ejercita, nombre y apellidos del titular y los datos de contacto para recibir notificaciones. Este derecho se podrá ejercer, entre otros, frente a datos parciales, inexactos, incompletos, fraccionados, que induzcan a error, o aquellos cuyo tratamiento no haya sido autorizado por el titular. Por disposición legal, anteia dispone de diez (10) días hábiles para dar respuesta a las solicitudes, los cuales se pueden extender por un periodo de cinco (5) días hábiles cuando no fuere posible atender la consulta dentro del término dispuesto. Además de lo dispuesto en la presente Política, los procedimientos a seguir para la atención de consultas y reclamos serán los establecidos en la normatividad aplicable del territorio donde se realiza el tratamiento de datos. 20 . Transferencia y Transmisión Internacional de datos personales. anteia realiza la Transmisión o Transferencia internacional de los datos personales, para este caso anteia, además de contar con la autorización expresa e inequívoca por parte del Usuario Final se asegurará que la acción proporcione los niveles adecuados de protección de datos conforme a los parámetros de seguridad establecidos en la regulación donde se tratan los datos, las buenas prácticas y las señaladas por las autoridades. De otro lado, cuando anteia realice Transmisión Internacional de datos, podrá hacerlo sin autorización de los titulares, siempre y cuando garantice la seguridad de la información, confidencialidad y las condiciones que regulen el alcance del tratamiento de los datos. ya que, la divulgación a Encargados no requiere consentimiento (no se considera transmisión). El tercero receptor asumirá las mismas obligaciones que el responsable que transfirió los datos. Para este fin anteia suscribirá el correspondiente contrato de transmisión de datos personales en los términos establecidos por la regulación aplicable. Para la transmisión de datos, no se requiere consentimiento cuando: Sea necesaria para el cumplimiento de un contrato en interés del titular. Sea precisa para el mantenimiento o cumplimiento de una relación jurídica entre el responsable y el titular. Sea permitido según lo establecido en el artículo 16 de la Ley 1581 de 2012. 21. Ley Aplicable: Al usar cualquier servicio de anteia, usted acepta que la ley aplicable depende del Centro de Arbitraje en Colombia, las leyes sustanciales del país donde se origine la controversia y bajo los principios del Reglamento General de Protección de Datos (RGPD) [(UE) 2016/679 del Parlamento Europeo y de Consejo de 27 de abril de 2016.] 22. Cambios en esta política de privacidad La política se revisará de vez en cuando para tener en cuenta los cambios en nuestras operaciones o prácticas y, además, para asegurarse de que sigue siendo adecuada a cualquier cambio en la ley, la tecnología y el entorno empresarial. Toda la información personal que se conserve se regirá por nuestra política más actual. 23. Referencia Normativa La presente Política de Privacidad ha sido elaborada en concordancia con las siguientes normas: las leyes aplicables al territorio donde se hará el tratamiento de datos y el Reglamento (UE) 2016/679 del Parlamento Europeo y de Consejo de 27 de abril de 2016. Última actualización: Marzo de 2023

  • Staff011 | anteia sas

    Ernest Viana product manager phone +57 301 596 6685 Email ernesto@anteia.co

  • Staff007 | anteia sas

    Ernest Viana product manager phone +57 301 596 6685 Email ernesto@anteia.co

  • X-EIA | anteia sas

    X-EIA Terminología Beneficios Proceso Casos de uso FAQ Analytics Solicita tu DEMO It is a digital method to authenticate and validate electronic documents. It is used to verify the identity of the sender and guarantee the integrity and authenticity of the document. The electronic signature is based on cryptography and security technologies. In many countries, it is legally valid as a handwritten signature on paper. The implementation of the electronic signature has improved the efficiency and speed of document management, reducing costs and work. In the Anteia ecosystem, an identity verification is carried out to associate a certificate with the digital identity of the signer and guarantee the integrity and non-repudiation of the document. Our validation methods include facial recognition and text messaging with one-time codes. It has time stamps certified by reliable authorities and can be verified and stored for a long time. The electronic signature process requires that all parties involved verify their identity and accept the conditions before generating the final document, complying with regulations and integrity. G. lossario Cryptographic algorithm. It is a mathematical process used to encrypt and decrypt messages and to generate cryptographic keys. Authentication. It is the process of verifying the identity of a user. Self signature. It is an electronic signature that is made without the intervention of a certification authority. Certification authority (CA). It is an entity that issues and manages digital certificates. Digital certificate. It is an electronic file that contains information about a user's identity and their public key. Root certificate. It is a certificate that is the root of trust in a public key infrastructure. public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user. private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents. encryption. It is the process of encoding a message so that it can only be decrypted by the recipient. Signature with time stamp. It is an electronic signature that includes a time stamp that shows the date and time the signature was made. Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents. Electronic signature. It is an electronic representation of a handwritten signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Multiple signature. It is an electronic signature that is made by more than one person. hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document. Public Key Infrastructure (PKI). It is a set of procedures, protocols and services used to create, manage and validate digital certificates. Integrity. It is the guarantee that an electronic document has not been altered since it was signed. I do not repudiate It is the guarantee that a user cannot deny having signed an electronic document. Security token. It is a physical device or software that stores private keys and is used to sign electronic documents. Timestamp. It is a timestamp that is added to an electronic document to show the date and time it was signed. Certificate validation. It is the process of checking the validity of a digital certificate. Check. It is the process of checking the validity of an electronic signature. Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. multiple factors A solid confidence Benefits Allows multiple signers. Allows you to sign documents faster and more efficiently compared to scribble signatures. Helps protect the confidentiality and integrity of documents. It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them. Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper. The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice. It gives the possibility to people with disabilities to sign documents in a more accessible way. It allows for greater transparency and traceability in document management, which can be useful in audits and reviews. It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management. It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management. You can make adjustments and updates in real time, increasing flexibility and adaptability in document management. Reduces the risk of document loss, damage or theft, increasing security and reliability in document management. Access and manage documents faster and more efficiently, which improves productivity and efficiency. It is compatible with mobile devices, allowing greater mobility and flexibility in document management. Use cases Financial legal contracts and agreements. Billing and monitoring of payments in the accounting sector. Job application forms and monitoring of the hiring process in human resources. Requests for orders and monitoring of the supply chain in companies of logistics. Medical forms and record of clinical histories. Applications for enrollment and monitoring of students. Travel request forms and travel management. Credit applications and loan monitoring. Insurance application forms and claims tracking. Requests for inspection and monitoring of products in the manufacturing industry. Requests for acquisition and monitoring of real estate. Loan contracts, investment agreements, credit card applications. Real estate. purchase-sale contracts, rental contracts, property deeds. Medical consents, electronic medical records, medical prescriptions. Permit applications, public service contracts. Software license agreements, cloud service provider agreements, outsourcing agreements. Enrollment applications, teacher contracts, professional internship agreements. Transport contracts, delivery agreements, storage agreements. Insurance policies, reimbursement requests, indemnity agreements. Supply agreements, purchase contracts, technology license agreements. Online purchase agreements, subscription contracts, affiliate agreements. Hotel reservation contracts, vacation rental contracts, catering agreements. Input supply agreements, crop sales contracts, land lease agreements. Frequent questions What is the difference between digital and electronic signature? The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards. What types of electronic signatures are there? Simple electronic signature. Electronic representation of a handwritten signature, used to authenticate electronic documents. Digital signature. Electronic representation of a signature, used to authenticate electronic documents. Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust. Recognized electronic signature (FER). Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature. Self signature. Electronic signature that is carried out without the intervention of a certification authority. Multiple signature. It is done by more than one person. Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made. What documents can be signed electronically? Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security. How is the authenticity of an electronic signature verified? It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority. What requirements must be met to perform an electronic signature? To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it. How is the security of electronic signatures guaranteed? A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities. How is the electronic signature integrated into business processes? The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication. What happens if the device used for the electronic signature is lost or damaged? How is an electronic signature revoked? How is the privacy of electronic signatures guaranteed? How is the integrity of electronically signed documents carried out? How can non-repudiation be guaranteed in electronic signatures? What systems or technologies are used for the electronic signature? How is the authentication of users who perform electronic signatures performed? How can electronic signatures be stored and managed? What legal implications does the electronic signature have? Is the electronic signature valid in any country? What support does the electronic signature have? What are the mechanisms to sign? Biometric fingerprint and OTP. Can you sign multiple documents simultaneously? How many signatures can I put on a document? Do you have end user support? Analytics Number of documents signed, number of active users, average session duration. Response times, error rate, level of availability. Number of users, roles and permissions assigned, level of user activity. Average time to perform an electronic signature. Number of valid and invalid certificates, certificate validation success rate. Integration with other systems. Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations. Number of successful and failed signatures, overall success rate. Level of user satisfaction, pain points and problems reported, level of adoption of the platform. Number of users who access the platform from mobile devices, types of devices used. Geography. Geographic location of users and signed documents, analysis of geographic trends. Total cost of implementation and use of the service, costs per user and per signed document. Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features. Documents created, shared and collaborative. Average time per document. Solicita tu DEMO

  • Staff005 | anteia sas

    Ernest Viana product manager phone +57 301 596 6685 Email ernesto@anteia.co

  • PQR | anteia

    Sistema PQR´s (Peticiones, Quejas, Reclamos, Sugerencias) Sistema PQR´s (Peticiones, Quejas, Reclamos, Sugerencias) El Sistema de Peticiones, Quejas, Reclamos y Sugerencias (PQRS) es una herramienta que nos permite conocer tus inquietudes y manifestaciones teniendo la oportunidad de fortalecer nuestro servicio y seguir en el camino hacia la excelencia operativa. SUGERENCIA: Es una propuesta presentada por un usuario para incidir en el mejoramiento de un proceso de la empresa cuyo objeto está relacionado con la prestación del servicio. PETICIÓN: Es una actuación por medio de la cual el usuario, de manera respetuosa, solicita a la empresa cualquier información relacionada con la prestación del servicio. QUEJA: Es la expresión o manifestación que le hace el usuario a la empresa por la inconformidad que le generó la prestación de nuestros servicios. RECLAMO: Es la oposición o contrariedad presentada por el usuario, con el objeto de que la empresa revise y evalúe una actuación relacionada con la prestación del servicio en términos económicos. Soy... Elige una opción Nombre Apellido Email PQR sobre Elige una opción Cuéntanos un poco más... Acepto los términos y condiciones Enviar Gracias. Estaremos en contacto pronto.

  • Error 404 | anteia sas

    404 Hemos actualizado nuestra página Ya puedes visitar la NUEVA VERSIÓN Volver a Inicio

©2023 by anteia sas | hyperautomation.

bottom of page