Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Why DRM is is better than access controls for document security

in Blog, Document Security, DRM, PDF Security

Document security, access controls, & DRM.

Document security requires a lot more functionality than access controls to deliver a logical series of controls.  Here we look at how and why the extra controls in DRM are essential to delivering secure document systems.

A History of Document security

Whenever anyone mentions document security you can guarantee that everyone knows what they mean, and each viewpoint is different.  And that’s entirely normal.

For those still handling paper documents, document security means is the paper likely to catch fire or get flooded (when the fire brigade arrives) and does my system let me find documents in that stack of paper?

Large organizations moved over to microfilm/microfiche many years ago.  The questions for document security were: does it catch fire, can I search it electronically reliably and can I add tags so that it is quicker to do searches?

The digital age arrived and scanning was directly to images on a computer.  Now document security got a tad more complicated because, thanks to optical character recognition, you could search documents based on content – albeit slowly at first, but faster as machines got more powerful.

At the same time electronic documents grew in popularity, with Microsoft Word (see How to password protect a word document and why it is useless) becoming the leader in document creation for users, and Adobe Acrobat Portable Document Format (PDF) for creating a consistent form and format of document content.  This was initially for the printing industry, and subsequently for general organizations looking to get document security, this time meaning: can I lock the format, does it print the same whatever device I use, can I detect forgeries?

Document access controls and DRM

Then document security stepped into several new leagues.  The original document security controls were all about computer file access controls.  But they could be easy to change, usually by just moving them to a different computer.  And, following the computer network protocol Kerberos, which issued ‘tickets’ to grant users ‘rights’ to exchange information over an untrusted network, the idea grew that there should be some kind of digital document security control.  Digital Rights Management (DRM) for documents was invented.

But document DRM was to prove rather more complicated than the original file access controls because it had to address content security on top of the original access controls.

Adobe and PDF DRM security

As far as document security development is considered, the early work was done by Adobe.  There was other DRM class work done in the music and film industries but we are not considering them here.  Because Adobe had strong links to the printing industries they were more concerned with being able to provide proofs that could not be used for quality printing and being able to be certain that a printed copy would be faithful to the original, and could not be easily altered.

PDF DRM had begun.  But there were other requirements for PDF DRM than printing quality.  A major problem for all industries has been preventing users from readily copying and distributing documents, and readily extracting the content itself (text, pictures, links and so on).  PDF DRM has remained the focus of document security because the format is reliable and will appear the same almost regardless of the starting and ending operating systems.  So that is why PDF DRM is the focus for document security systems.

DRM developers have added a range of extra features and facilities to support sophisticated document and content security, and I now consider some of the subtler functionalities that have improved document handling and management.

Document DRM controls and encryption

Electronic document security has to have overarching controls aimed at preventing the unauthorized use (misuse) of document contents, including the following features:

  • Not before or start date – the date before which the content should not be available to use
  • Not after or end date – the date after which the content must not be available
  • Watermarking on viewed screen with dynamic content (i.e. user’s name, email address, date/time stamp, etc.)
  • Watermarking on print out with dynamic content

Of course you cannot leave the document in its original format because there are loads of tools available to process it and remove passwords and other mechanisms.  So you need to encrypt the documents so you can achieve secure document distribution.  And the key for the encryption has to travel separately from the file or it can be hacked, and not disclosed to the user (i.e. protected with a password the user must know) otherwise they could pass it on to others.

It would be very unwise to send documents that are only protected by access controls across the Internet or have them synchronised with remote folders.  But if you have encrypted the document and bonded to it the controls and rules that are to be applied, then you can safely let it be shipped around as an email attachment or on a flash drive.

Document revocation and online or offline security

Other essential document security controls include the ability to switch authorised use off and on dynamically.  This action may be at the document level (perhaps the document has incorrect information in it and needs replacing) or at the user level, (the user has taken on a new job and no longer has access to some documents).  These controls require the authorised user to be online to a license checking system that monitors access requests.  If the user is offline, then controls could not be enforced until the user was next online for some reason.

This creates a problem in that there are many reasons why you could not require users of secured documents to be online before they can be used.  Apart from the problems of getting online in aircraft (even mobile phones don’t always work) the signal may not be so good on the beach and some locations are more difficult than others (anyone had to lean out of a window to get a mobile signal?).   And there is nothing more annoying that an intermittent connection!  So compromises have to be thought about.  One approach is to check the use when the document is first opened, and never again.  This means it can be used anywhere anytime, but the controls can’t be changed once it has been opened.  This is very much the traditional book model – once purchased can be used until (unless?) it falls to bits or gets hit by a wave on the beach.

A different approach is to say that if an Internet connection is available then do a controls check, but not otherwise.  This is more user friendly approach because it does not demand an Internet connection before secured documents can be used.  But it does create an ability to make changes since few people can manage without an Internet connection for any length of time so a check is likely to happen fairly soon.

A compromise is to require a check every so often (say 90 days?) and allow a ‘grace’ period so a check can be made within a few days of the actual check date.  These kinds of licensing enforcement are much more acceptable than an inflexible demand to be online all the time (unless we are talking about an internal control system or highly sensitive material).

Content security and stopping document misuse

I mentioned earlier that content security is an essential part of document security.  This doesn’t just mean stopping people from ‘Saving’ the document in an uncontrolled form (or a different format).  It also means stopping the use of copy and paste, and preventing screen grabbing and re-assembling the content from collections of pictures.  Sometimes it is not possible to stop copying – what the eye can see is visible to the cell phone camera.  But with extra controls, such as watermarking, you can make the theft of content a much more difficult proposition.  Random watermarks that don’t obscure the text can dissuade someone because they can be very difficult to remove without wrecking the document content and they may identify the identity of the authorized user.  The user will not want to make it clear that they conspired to bypass controls.  It could not have been another user because the security controls link documents to licensed computer users so that documents can only be used by authorized users.

There are many other document security controls that can be applied.  Locklizard, a DRM specialist in controls and mechanisms for enforcing document DRM, produce systems that will assist you to obtain and retain control over your documents.  They deliver all the functionality I have described in this blog, and much more.

 

Tags: document access control, document drm, document encryption, document protection, document security, pdf drm, pdf security, secure document, secure document sharing, secure documents, share documents securely
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Are safe data rooms secure enough to share your sensitive data? Link to: Are safe data rooms secure enough to share your sensitive data? Are safe data rooms secure enough to share your sensitive data?Link to: GDPR: Data protection & document security Link to: GDPR: Data protection & document security GDPR: Data protection & document security
Scroll to top Scroll to top Scroll to top