DRM is an acronym for Digital Rights Management, a term used to describe the technology that controls or restricts how content can be accessed and used.
Digital Rights Management solutions use multiple security technologies to prevent unauthorized access and restrict use. These include:
DRM protected refers to any file that has DRM restrictions or controls applied to it to prevent copying, editing, and unauthorized distribution of digital content.
DRM protected files are also encrypted to prevent unauthorized access, and a license key is used to authorize access and permissions.
To access DRM protected or restricted content you need a valid license key, the appropriate decyrption key, and software or hardware that can decrypt and apply the DRM controls.
Digital Rights Management restrictions enable publishers or creators to control what authorized users can do with protected content.
Such restrictions or permissions include:
In addition, Digital Rights Management systems let content creators track and log use so they can view analytics data on when digital content was used (i.e. when documents were viewed and printed), by whom, and when.
DRM works by using multiple security technologies & applications to control access to and use of content. These include an app to protect content, a license server to manage rights, and an app to view DRM protected content.
To apply Digital Rights Management controls to content (to create DRM protected content), content owners use a protection application. This encrypts the content so it can only be viewed by someone with the correct decryption key (see document encryption), and lets you choose which DRM controls to apply (i.e. preventing printing or making the content expire after a period of time). The protection app could be software installed on a device, or an online service solution where content is uploaded to a cloud server before being protected.
A DRM license or DRM key ties a user to a specific account on a DRM license server (also known as a DRM server, rights manager or rights manager server) and provides control over the content they can access. Users have to enter a license key or click on a link to activate their license which is then locked to the device.
The DRM license server is used:
The Viewer application checks that it has the necessary decryption key to decrypt the content, and if it does, it loads the content with the appropriate DRM controls applied. If the Viewer application does not have the correct decryption key(s) it will check with the DRM server to see if the user is allowed access to the protected content. Additional checks are made to the DRM license server as and when required, such as checking for new access rights.
DRM protected content can be viewed in a number of ways:
Permission to access DRM protected content and its continued use can be revoked, and rights or restrictions changed on-the-fly. When this is enforced depends on when the DRM device connects to the license server.
Always on DRM, or online DRM, requires a permanent internet connection so that license and access controls can be constantly checked against the license server. Content cannot be used if an internet connection is unavailable or if the rights management server is down.
Always on DRM is popular for music, gaming, and video services where content is streamed online.
Offline DRM allows content to be used without enforcing an internet connection. In this case, a check is made against the license server when the content is first accessed to download the decryption key and controls, and after that connection, content can be used offline.
Offline DRM is popular for e-books, training courses, etc. where users have purchased a perpetual license to use content and require use in situations where an internet connection may not be readily available (i.e. the beach, a plane, etc.).
Choosing whether to enforce online DRM is a business decision where the user requirement must be taken into account together with the media you distribute and the controls you wish to have available. For instance, you cannot revoke an offline document once it is distributed.
Locklizard provide both online and offline DRM software solutions. Content owners can specify how long a user can remain offline without requiring to connect to the license server or to connect once only. Locklizard also provide a fully offline DRM solution where content is protected to USB sticks and no server connection is ever required to view protected documents. Our offline DRM provides the same security as online solutions so there is no reason to force users to be online unless you want instant revocation.
Even hardware devices use software DRM, which is updated with firmware updates (software code). The use of integrated hardware however enables more control over the operating environment and helps prevent users from bypassing or removing DRM protection.
DRM support of both software applications and hardware platforms is becoming more popular due to the increased demand of streaming services, working from home, and paper-free workflows. Microsoft (Xbox), Apple (FairPlay DRM) and Amazon (Amazon DRM for Kindle) are just a few of the major businesses that use both DRM software and hardware to protect their intellectual property and revenue streams, and many hardware devices now read DRM files.
For documents published in PDF format, thousands of publishers use PDF Digital Rights Management software to protect their training courses, reports, confidential documents, and ebooks from unauthorized access and misuse.
Digital Rights Management has come a long way since Sony first protected DVDs with region controls in hardware, and software DRM can now replace much hardware functionality.
Digital Rights Management is used to prevent unauthorized users accessing content and to control what authorized users can do with it. It ensures the owner, author or publisher of a work can prevent piracy or illegal sharing, enforce their copyright, and exert controls that limit what a recipient is entitled to do with it.
Traditionally, in the print publishing industry, the author (or publisher) of a book asserts their right to be able to control what the purchaser can (or cannot) do after they purchase the work. This typically takes the form of a copyright claim on the first page.
However, there has been a major power shift in publishing due to digital transformation. Previously, copying and re-printing a physical book was non-trivial – if you wanted to steal someone else’s work you needed to find someone willing to publish the copy, and the publisher knew they would be sued without mercy. There were some really obvious physical controls in the physical print industry that could not be overcome on a mass scale.
But the digital age has changed all that. Suddenly, computers can make copies at near-zero cost, and do so without detection. The rules of the ancient world no longer apply. The use of websites to facilitate the sharing of pirated films, music, and PDF documents demonstrates that works that do not have digital rights management applied can be copied an unlimited number of times. Files can be shared and transmitted without any control at all. Even print documents are threatened, with users able to scan a document, turn it into a PDF, and distribute it digitally.
So, digital rights management is a critical feature if you are making confidential information available to others – whether it is a price list, a contract specification, an analyst’s report, a newsletter, or a book. Without DRM, you have no way of preventing people who have access to your intellectual property from doing whatever they like with it. DRM software lets authors and publishers exert more appropriate digital rights over content than they were able to in the physical print era. This is why most publishers across various industries will use DRM to protect their intellectual property.
It is popular in the digital music (Spotify, Apple, etc.), movie streaming (Netflix, Amazon, etc.), DVD (blu-ray), gaming (Steam, Xbox, Sony, etc.), and ebook industries (Kitaboo, Amazon, etc.) to control digital content distribution, prevent unauthorized use, and protect revenue streams.
Whilst many end-users paying a few dollars for a song, movie, or ebook, are against the use of DRM, it is more readily acceptable in the business world, protecting high-value reports and content available to members only. This is because if someone has paid $1000 for a report, they would not necessarily be happy if other users were to receive the same document for free.
DRM within an organization is also known as Enterprise Rights Management or Information Rights Management. Some online systems where document controls and access can be altered in real-time are sometimes referred to as Active Rights Management systems, but essentially they are all the same thing.
If you want to lock a Google Doc to stop sharing, protect a Word document from editing and copying, prevent ebook piracy, make a PDF non editable or add a watermark to a PDF that cannot be removed, then only DRM software can achieve this.
Publishers can employ these restrictions and controls to not just protect their revenue and prevent illegal activity, but enable new forms of content distribution.
Some of the benefits of digital rights management for documents include:
The ability to ‘rent’ or ‘loan’, or provide subscription content to users at a lower price than a lifetime purchase. Publishers can expire a user’s access after a certain date or when a subscription is not paid without them being able to easily bypass it. This system provides users with more affordable pricing and publishers with a new, steady revenue stream.
Increased revenue through anti-piracy and sharing mechanisms. Drastically reducing publishing costs without seriously losing revenue and gain access to significantly larger potential global markets than before.
Clearly state and enforce your copyright through a combination of irremovable dynamic watermarks and copy protection measures.
Prevent documents from being leaked before publication by restricting them to specific start dates, specific devices, IP addresses, and locations.
Stop ebooks from being accessed in specific countries (such as those with differing distribution rights) or prevent employees or third parties accessing content outside of authorized locations.
Stay compliant by proving proof of the use of documents, and enforce document retention policies.
Analyze customer use to see what content they have viewed and/or printed.
All of these benefits make an effective DRM solution or software well worth the investment for most publishers and companies.
Using Safeguard DRM software to protect PDF files
You’ll need to send your recipients the DRM protected file, alongside a download link for the secure reader application and a valid license. The simplest way of doing so is by ticking “Email license” when you add a new user. See how to add a new user and grant them document access.
DRM technologies are here to stay for the foreseeable future – increasingly file and document sharing systems are implementing DRM to provide greater control over digital content use.
Digital Rights Management is the next logical step after encryption for enabling publishers to retain control over their intellectual property and protect their revenue streams no matter where their content is published.
Encryption can only protect content at rest or in transit – once a user opens the file, they have full control over its use. DRM systems use encryption to control document access along with DRM controls to enforce or restrict digital content use.
Using a blockchain for DRM can useful for the validation of user credentials, maintaining a decentralized ledger of licences linked to copyright material, and maintaining access logs. Since the entirety of the data is stored on a number of server nodes and distributed across a peer-peer network, the data cannot be tampered with and hence is immutable. It also prevents the loss of data in case a centralized server goes down, but this may be a moot point with backups, load balancing and other failsafe technologies already in common use.
The problem with blockchain is the speed – both lookups and the writing of data across multiple systems, and the sheer cost of transactions both environmentally and monetarily. However some DRM service providers are likely to be attracted by its novelty. So if businesses are wiling to spend the money and don’t mind the environmental costs, then blockchain DRM might have a future.
DRM stands for Digital Rights Management, a set of permissions, rules, or constraints to limit how content can be accessed and used.
DRM content is digital content (i.e. an ebook, PDF document, etc.) that has had Digital Rights Management controls imposed on it to prevent it from being used in an unauthorized manner as determined by the owner, author or publisher of a work. This may be controls to prevent it from being edited, copied, shared, screen grabbed and printed.
It depends entirely on what you are trying to achieve. Using DRM technology is typically a good idea if you are planning to make a profit, keep certain information out of the public eye, or ensure that your work is not attributed to somebody else. If Digital Rights Management is implemented correctly then it is the only effective security for stopping unauthorized sharing of ebooks. This is because it can be used to restrict how digital content is used (stop copy/paste, disable printing, stop editing, control expiry, etc.). Not all ebook DRM however is equal. Some formats provide limited restrictions and have been comprehensively cracked – so choose your ebook format and protection solution carefully.
PDF DRM software like Locklizard is designed to stop unauthorized sharing, editing, and printing, and this makes it very suitable for keeping confidential documents private.
There is a small but passionate community of people who are anti DRM and say it only hurts paying customers. This is typically because Digital Rights Management places restrictions on legitimate users (such as how many devices a digital book can be used or, whether it can be printed, etc.) in order to prevent illegitimate ones.
However, there is sadly no way to identify whether a user will infringe on a publisher’s copyright in advance. As publishers must continue to make a profit (or users will lose access to the content they love entirely), DRM is the only real option to protect intellectual property from sharing and piracy. To prevent friction, publishers should be proportionate with their Digital Rights Management controls and ensure digital books and other content can be viewed on a wide range of Operating Systems.
Of course. Everybody has a right to protect their creative works and enforce their copyright. However, you must ensure that your DRM is compliant with privacy laws – ie. GDPR and tracking.
There are laws that govern both the use of encryption and DRM and the protection of copyrighted works. Using cryptography inside a country is usually lawful but there may be requirements that prevent export of cryptographic hardware and software to specific countries (the Wassenaar agreement). There is general agreement that if they are for public sale and the cryptographic mechanisms cannot be altered by the recipients they avoid regulation so that is OK. Where Digital Rights Management is concerned, the US produced the Digital Millennium Copyright Act (DMCA) which criminalizes the production and dissemination of technology, devices or services intended to circumvent measures that control access to copyrighted works.
The Digital Millennium Copyright Act (DMCA) and copyright law provide some protection against illegal use of your digital media. However you must be willing to put aside time and expense (lawyers) to enforce this. By using Digital Rights Management the copyright holder or the creator of digital content can prevent copyright infringement (unauthorized sharing and use, illegal distribution & online piracy) to begin with.
A DRM service usually consists of software to protect content (video, games, ebooks, documents, etc.), a licensing server to administer users and content, and software to view content. Protected files are encrypted to prevent unauthorized access and a DRM license determines what authorized users can do with it. A DRM service is usually hosted in the cloud but some Digital Rights Management companies provide own server solutions. Examples include Azure Information Protection, Adobe Experience Manager Document Security, or Locklizard DRM for documents, Adobe DRM and Amazon DRM for e-books, Spotify and Apple itunes for audio files, and Widevine DRM for video streaming. All of these DRM service providers use multiple security technologies that provide content creators with copy protection for their digital assets.
Essentially the terms have the same meaning. Digital Rights Management has historically applied to the protection of DVD video, music and gaming, whereas Enterprise Rights Management is a term more frequently used for the protection of business documents.
Encryption is used in Digital Rights Management software to:
Encryption is used to scramble data so that it cannot be used without the correct decryption key. It protects data in transit and at rest. Once the data is decrypted however a user has full rights over its use, including the distribution of unprotected files.
Digital Rights Management is a set of restrictions that control how decrypted data can be used. So users cannot share, copy, edit, print, etc. content. It ensures that only protected files can be distributed.
A policy is a set of restrictions that can be applied to a file. By using policies you do not have to manually choose the restrictions each time when protecting content.
It all depends on the implementation. Digital Rights Management enforced in the browser or using a plugin for example is not as effective since it is easier to bypass. DRM systems that use passwords also provide poor security since passwords are easy to share and/or remove. Many e-book solutions have also been poorly implemented, enabling security to be removed using cracking or conversion tools. Properly implemented, DRM can help prevent piracy by stopping illegal sharing and copying of content.
Social DRM or social watermarking, sounds like a great way to discourage pirating by identifying users. In reality both visible and invisible watermarks can be easily removed. This is because there is no DRM software to control use of the operating environment.
No. FileCloud DRM documents are encrypted with a key and can only be viewed in its secure viewer application. However, keys are managed by the end user, which means they can easily share them with unauthorized parties. Additionally, FileCloud does not stop screenshots in virtual machines or support watermarks to dissuade screen pictures via mobile phone.
No, DRM enforces copyright by preventing unauthorized access and use of content.