Document Security Papers
This section provides papers, overviews and information on digital rights management (DRM), intellectual property rights (IPR), copyright, PDF security, encryption, document security, content control, copy protection, rights management, trade secrets, plug-ins and document collaboration security.
If you would like a basic introduction to the subjects covered in this section please visit our information security learning center.
For terminology please see our information security glossary.
Encryption & Security
Introduction to Encryption
This paper covers
what encryption is, why you would use it, and whether it actually does what it says on the tin. It also covers the applications it is most commonly used in and what type of encryption algorithm you should be considering as commercially appropriate.
Encryption is not enough for DRM
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection. It covers key management, enforcing time limitations, and other methods of document control.
Passwords & PKI Security
This paper covers passwords and PKI security and how secure each mechanism is.
Using encryption to Secure Downloads & stop copying
This paper covers what methods can be used to secure downloads from unauthorized users, and how encryption can be more successfully used to stop copying and control unauthorized use of files once they have been downloaded.
Digital Rights Management - DRM
Introduction to Digital Rights Management (DRM)
This paper covers the technology called Digital Rights Management or DRM, what it achieves and how this benefits your business. It also covers the use of encryption and cryptography in protecting and controlling digital content.
Did you know that DRM is a security mechanism?
DRM technology is actually a refinement of existing access control technologies that allows a much more granular and appropriate approach to protecting access to and use of information in a widely distributed environment, such as the Internet, than traditional methods.
History of Rights Management
This paper covers the origins of Rights Management, covering the birth of copyrights and rights management and why you need to protect your content in the digital age. It covers Digital Rights Management and DRM controls.
Should DRM have standards?
paper covers whether DRM should have standards, and, if it should, then who should be setting the standards and what should those standards address.
Why secure dealing rooms are better implemented through DRM solutions
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is 'leaked'. This white paper addresses two examples of this requirement (boardroom secrets
and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Intellectual Property Protection - IPR
Protecting your Intellectual Property with DRM
How can you protect what is yours from being stolen? This paper covers how you can use Digital Rights Management (DRM) technology to protect your intellectual property (IPR).
Strategies for IPR/DRM protection and secrecy
This white paper
describes the differences between information, IPR and trade secrets, and where these might apply. We discuss the practicalities for DRM controls, and what these might realistically be, and how they might be used to stop copying. Finally we look at the different market models for current copy protection products and how they work, and then conclude on the suitability of approaches. It covers Trade Secrets, intellectual property rights, document collaboration systems, content protection, and Digital Rights Management.
Copyright Protection: IPR and the Digital Revolution
This paper covers why intellectual property law is ineffective in protecting the rights of small authors and publishers. It covers intellectual property rights (IPR), licensing controls, copyright, and copyright protection.
Preventing information Leakage - the enemy is within
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
International Copyright development and Fair Use
This paper covers how International copyright differs from country to country, the development of copyright, the concept of 'fair use' and how all of this affects you as a publisher of content.
the Copyright challenge - is digital different?
David Bicknell investigates how the ever-growing reach of the World Wide Web is affecting traditional views on issues such as copyright and intellectual property rights.
This article was orignally published by the Institute for the Management of Information Systems in their Journal, Volume 18, issue 3, June 2008 (www.imis.org.uk) and is reproduced here in full by kind permission. All rights are acknowledged.
Adobe Acrobat Security - a brief history of PDF security development
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM. It discusses lifecycle management, PKI and digital certificates, PDF password security,
PDF encryption, PDF DRM, Adobe livecycle / policy server, and third party systems and standards for protecting PDF files.
PDF Encryption and Password Security
This paper covers the origins of Adobe PDF document security and encryption and pdf password cracks and hacks. Learn
why PDF password security is not good enough to protect your PDF documents.
How Secure is Adobe PDF Security?
This paper is written by Bryan Guignard, an Adobe Certified expert. In summary he says 'Because of the 'respect' model used by the PDF specification, your encrypted PDF files offer about as much strength as dried eggshells!" .
10 things you wished you had known about PDF DRM Security, but they didn't tell you!
This paper covers what PDF DRM vendors are not telling you about their products and solutions, and what questions you should be asking. Is the PDF security software you are looking to purchase really
secure? If the PDF DRM protection software you are evaluating can be simply broken then you might as well save your money.
PDF Watermarking for document security
This paper explains what types of PDF watermarks can be added to PDF documents and what type of security they provide.
Adobe LiveCycle Rights Management
This paper explains why although Adobe LiveCycle can be used effectively within an organization for protecting PDF documents it is not necessarily a good choice for publishers selling information such as ebooks and reports.
Secured PDF - options & issues when creating secured PDF files
There are many options to consider when creating a secured PDF. This paper covers the protection methods and security features available for secured PDF files.
Document, Ebook, PowerPoint Security
Document Security - a guide to securing your documents
This paper explains what components make up a document security solution and which one is right for you. It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Document Tracking and Document Control
This paper explains what document tracking is and how it can be useful to the corporate enterprise in verifying document usage. It also covers the use of document control and integrity and why this is an essential component of a document tracking system.
Data Loss Prevention and Protection
Many organizations implement a data loss prevention solution to prevent loss of data outside the enterprise. But what happens if you need to communicate securely with third parties? DRM software can provide data loss protection both inside and outside the enterprise.
Analysis of E-Book Security
This paper written by Guoyou He from Helsinki University of Technology examines the concept of e-book security and why various companies have failed to produce a secure product.
Plug-in Security - plugins a source of insecurity
This paper examines and questions the claims often made by plug-in suppliers that they are secure, giving published examples of where they are not. It demonstrates why you should not purchase a document security solution that relies on plugins.
Why you should not use passwords for PowerPoint security but instead look towards DRM for a more secure solution.
Protecting ebooks against sharing and theft is a publisher's main priority if they are going to protect their revenue stream. LockLizard ebook DRM software provides ebook protection for ebooks published in PDF and HTML formats.
PDF copy protection
PDF copy protection is
just one of the components of PDF Security and PDF DRM software, applying copy protection controls to PDF documents to protect them against unauthorized sharing, theft and misuse.