Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Which documents should be protected?

in Blog, Document Security, DRM, Ebook DRM, PDF Security

Defining sensitive documents to protect.

Surprisingly few organizations classify their information in order to help them protect it from unauthorized disclosure.  Usually improper disclosures get noticed when personal data are disclosed, and that can mean litigation involving a corporate authority and the public, and bags of adverse publicity.

Although some cynics might say there is a competition to see who can claim to have had the most data disclosed.  In the UK Her Majesty’s Revenue and Taxes might have been in at the kickoff by disclosing some 25 millions of taxpayer records, but they have been made to look like amateurs by Yahoo, Card Systems Solutions and eBay – as a random selection.

But the reality is that more than one class of documents is sensitive.  That’s not to say personal data is not important – it is – because there is regulation that says so.  But there are other duties that have to be addressed with every bit as much care (or more so since some may say disclosing personal data is less costly than having your IPR stolen and pirated).

Other duties include those to the shareholders to protect the IPR assets of the business (without which trading could be harmed to the point of ceasing to trade) and contractual duties for which there are (usually) financial penalties.

This opens up a wide range of document types that have got to be protected.

So what documents should you protect?

Starting at the top are government official documents, board minutes, strategic analyses, analyst opinions and recommendations, sensitive manuals such as the credit reference methods of a bank, analysis criteria for an insurer, franchise agreements, service manuals, training manuals and courses, mergers and acquisitions, to name but a few. There are also documents that contain CAD drawings, with many architectural and engineering firms requiring a way to protect CAD files from being edited after they are shared. The EU machinery directive also allows manufacturers to distribute manuals digitally — another piece of literature that it might be prudent to protect.

More obvious sources of IPR include patent information prior to registering, trade secrets such as formulations (exactly how do you make Cointreau or Drambuie are trade secrets), not to mention books, magazines, plays, printed music.

It is easier to define sensitive documents are those which, if disclosed, would cause economic damage to the organization.  And the economic damage could be loss of sales, loss of market, or loss of reputation.

Document location management & DRM

Once you have decided which of your documents are sensitive – what are you going to do about it?  Do the documents have to go out of the internal corporate network?  Can you stop them?

Unless you are very unusual the answer to this question is no – you can’t stop them.  You must expect people to take documents out, whether they are email attachments, files uploaded to a server, files copied to USB, CD or DVD, or on a Bring Your Own Device (BYOD) like a cellular phone (in Germany called a Handy).  The ubiquity of environments means that documents are being synchronized by updaters such as Dropbox, or environments like Facebook without you knowing or remembering.  These are but a step away from seeing your documents released on WikiLeaks or the Torrent download sites, depending on what has got out of the bag.

So there has to be a game change if you are going to protect sensitive documents from being readily copied and used outside of the people you designate as being authorised.  And those people in many instances are not going to be insiders, and even actual insiders are going to have to be able to use documents outside of the corporate or departmental network just as if they were outsiders.  That means that the documents must be encrypted, because otherwise there is nothing to stop anyone from using ordinary programs such as Word or Notepad on them.  The same goes with pure encryption such as that provided by companies like PGP.  They prevent anyone without authorization from opening the protected files, but once they are opened the user may do what they like with them.  Which is not really the plan.

The answer is to have persisting controls that are bonded to the encrypted document and cannot be trivially removed.  This then requires a special program to be able to decide if the document is being used in an authorized location (computer, IP address, geographic region) and can enforce the design controls and resist hacking and cracking attempts, as well as preventing screen grabbing and stopping printing.

Document DRM – what controls to apply?

Next is the question of what controls are appropriate for which classes of documents?

An unhelpful answer would be, it depends.  But if you have gone through even a high level review of which disclosures would hurt you then there are some good clues as to what protection is actually worth.

There are not so many documents from government that cause excitement, except the un-redacted discussions by senior advisers and their bosses.  These usually need very high levels of protection to be applied.  The other documents that cause problems are policy documents for the security agencies, but we are not considering their highly specialized requirements in this blog.

In the corporate world board papers and minutes and mergers and acquisitions documents are usually secret, but may also have to be distributed to many people outside of the corporate body.  Non-executive directors, pension fund trustees, lawyers and accountants are amongst those who need access.  But they are all outsiders and not in the control of the IT department.  They must be able to read documents, and retain access to all the papers made available to them, but not to pass them on.  Access may well be offline and printing is probably forbidden.  For more sensitive documents watermarks may be present on the viewed image showing who was authorized to use it.

Manuals, including training manuals and courses, are valuable documents that are usually sold or are part of corporate certification for staff training.  They will have to be able to go to people who you don’t know, they are outside of the domain of the provider and you have no idea what security, if any, they will apply to documents they receive.  The documents always represent the intellectual property of the creators and are valuable in two ways.  The first is the knowledgebase that they contain.  The second is the skill of presenting education materials so that they can be readily absorbed by the student.  Courses and manuals tend to be available only for fixed periods of time so you have to have a control system that can have start and stop dates (so the time of the course can be covered) that can be changed after the manuals are issued in case someone is ill or for technical reasons the course dates have to be changed.  Also there may need to be a facility to allow prospective users to review the materials (maybe look at it two or three times, or for a day or two, to feel confident it is worth the money) before committing.  These are interesting in that some of the documents will need to be printed (course notes) whilst the main training slides and all the linking and structure would need to be kept secret, particularly if there are instructor packs as well as student packs.

Analyst reports, membership association materials and magazines all have in common that they provide access to information based upon a membership type of system.  So the documents need protecting because they represent intellectual capital and brand value that is lost if they are freely distributed.  Contrary to some assertions nobody ever buys what they can have for free – why should they?  It is the scarcity in a market that brings about the market, not a glut.  So again we have to deal with people who are not known (except maybe their credit card), and there has to be a fairly sophisticated control system knowing when documents are published, who has access to them, what happens when their subscription gets updated or cancelled, and so on.

Finally there are book sales.  They are perhaps the most challenging because the controls on them will have to work offline, and the rights of access are usually forever.  However printing is probably not allowed as copying is usually a forbidden activity with copyright works (see the copyright statement on one of the front pages of most paperback and hardback books).

So we have reviewed what types of documents generally need to be protected, what are the general reasons for protection (in order to know what it is worth spending) and the types of controls that you might expect to have to apply.

Tags: data loss prevention, document drm, document encryption, document protection, document security, enterprise rights management, information rights management, protect documents
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Help – Safeguard Admin 4 – My Account Tab – Sub Accounts Link to: Help – Safeguard Admin 4 – My Account Tab – Sub Accounts Help – Safeguard Admin 4 – My Account Tab – Sub AccountsLink to: Securing documents in the cloud Link to: Securing documents in the cloud Securing documents in the cloud
Scroll to top Scroll to top Scroll to top