Blog

Digital media authenticity

Business Quality Digital Media Guideline #3: Tampering

Malicious tampering of digital media is typically a sign of fraud. When media has been altered to change the state or appearance of an insured asset, the media should be rejected and/or replaced. Malicious tampering can happen in a number of ways.

white wall with black mold and damage next to a radiator
Digital media authenticity

Business Quality Digital Media Guideline #2: Quality

By having a process that immediately detects low quality and then automatically requests a customer to resubmit that image or video is the ideal way to prevent issues whether it be a claim, quote or other transaction.

blurry low resolution picture of a red car
Digital media authenticity

Business Quality Digital Media Guideline #1: Resolution

Photos and videos should be of high enough resolution to meet the needs of transactions and claims. When relying on images to make decisions and support automated operations, the details within the photo matter.

Digital media authenticity

The Importance of Guidelines for Insurance Photos and Digital Media

For insurance carriers who are thinking about or who have currently implemented self-service processes for gathering photos and digital media that will be used in claims, underwriting or inspections, it is important to put in place a set of guidelines BEFORE they begin using this customer-provided media.

person using photo editing controls on mobile phone
Digital media authenticity

Protecting Against Digital Media Fraud Part 2: Secure Editing

When capturing a photo from a camera or a video recorded on a smartphone, it’s not unusual for that photo or video to be edited but for businesses that need files to be 100% authentic, protection against all editing is essential.

Data Integrity Scale
Blockchain

Can Blockchain Solve Data’s Integrity Problem?

Goodness is hard to measure. More so in the field of Cybersecurity. In the physical world, if you possess something, say a $1 bill, you have it. If you spend it, you don’t have it. If someone steals it, you don’t have it, either. The digital world is quite different.