SmartCompliance gives risk managers the technology to manage compliance in-house, eliminating the need for a costly full-service intermediary. Customize our insurance document and vendor risk management software to meet your Collection and Issuance needs. No matter how you customize your system, the following features are included for all users:
Optical Character Recognition (OCR)
Our software translates data from ACORD insurance certificate images into text. That text is then compared to your customized risk templates, automatically determining compliance with contractual requirements for your review.
Centralized Online Database
Easily search, sort, view, and download all documents and corresponding data in the system, replacing file cabinets and hard copies for online, secure, paperless document storage. All users have access to the most updated and relevant information at all times.
Communications & Templates
Contact vendors and/or certificate holders directly from within the system to collect and/or issue documents, update profile information, or request clarifications. Build communication templates for quick correspondence on all issues and monitor the system’s communication history.
The SSAE 16 compliant audit log built into the system provides instant accountability. Monitor document, data, and user activity for ongoing administrative oversight.
Generate custom reports to show analysis and feedback on all system processes, from Duplicate Insured reports to Issuance Productivity reports. Easily clean out duplicate or erroneous data and directly request additional or updated information. Export reports in PDF or Excel format, or email as an attachment.
Secure Online Access
With a username and password the system is instantly deployable via a web browser; no installation nor extensive user training necessary. Users can call live support staff or submit online support tickets for any issues, complaints, or requests for the monthly software update.
Data Privacy & Security
The secure system is available anytime, anywhere via browser or mobile device but only to those with authorized access. System administrators can also set special rules and limitations to each user’s access and viewing capabilities and monitor all activity within the system.