Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

DRM and Data Protection

in Blog, Document Security, DRM, PDF Security

DRM, the California Consumer Privacy Act & data protection.

As more regulations are introduced concerning the use of personal data it is important to understand how it can be accessed and used securely.  DRM can help with tightly controlling use, ensuring it is not exposed or misused.

Never before have we had so much interest in the securing of personal information that is being carried over the web (Internet).  It has exercised both politicians and pundits.

Not so long ago the European Union politicians upped their game for requiring data protection for their citizens personal data, by setting higher standards, requirements and fines for non-compliance with regulations specifying adequate security measures to protect data that are collected, and restricting the authority to collect personal data, by introducing the General Data Protection Regulation (GDPR) which came into effect in May 2018.

In 2016 Tim Berners -Lee expressed dismay at the subversion of the ethics of the Internet following allegations that Russian hackers had interfered with the US 2016 election, and the Facebook-Cambridge Analytica data sandal became public.  His response was to indicate that the Internet was in need of repair, and created the Solid project as the first step to give individual users full control over the usage of their data.  This project is gaining serious traction in the technical world.

Finally, in 2020 The State of California brings into force the California Consumer Privacy Act (CCPA) which among other things protects and limits the sale of the personal data of California citizens, allowing opt-out from sale of their personal data and requiring collectors to declare what data are shared and with whom.  This comes on top of data privacy regulation.

Does this have anything to do with Digital Rights Management?

The obvious answer is yes – and no.

GDPR considers the protection of data that is collected and stored for some valid reason.  CCPA is slightly more biased towards forbidding or controlling the sale of personal data and providing links to identify personal data users.

Tim Berners-Lee appears at the moment to be more focused on authenticating the source of information and granting rights to authorized recipients of those data.  This requires some means of certifying users and their identification (perhaps preventing the British Conservative Party changing its Twitter account name from @CCHQ to @factcheck UK, potentially misleading users, something he condemned as bad practice).

Where does Digital Rights Management help provide control

Identifying the correct recipient of information

One thing DRM systems have had to sort out is a cheap and reliable method for identifying users where there are no generally accepted standards.

The most effective and cheapest approach to identification is to use self-identification by locating the machine identity of the device the user is using and linking that to their claimed identity.  This is because the manufacturers allocate unique identity numbers so they can identify them.  This can be backed up by the IP address/location of the device if necessary.

An identity formed in this way has the advantage that it does not need any administration.  It can be set up dynamically, reducing cost and complexity.  What it does do is link a personal identity to a machine that is fixed.  So the DRM controls use an identity issued by the DRM owner that need not be understood by the DRM engine itself.  People don’t often give away their mobile or tablet or laptop, so the approach is reasonably reliable.

There are other schemes available for identification using a registered identity – bringing together a postal trading address, an individual’s identity and a bank or credit card reference and registering them in a publicly accessible registry.  The commonest scheme used today is the Public Key Identity (PKI) scheme used in Secure Sockets Layer (SSL) – much favoured by Internet web sites but is relatively expensive to run and would not be attractive to private users.   Also, it requires a lot of validation and management to make sure that the authorized identities link together and are valid, or the scheme falls to bits.

Identifying information publishers

Good DRM makes use of SSL as part of the process of secure conversations with authority servers to prevent attacks on data in transmission, protecting the confidentiality of information being transmitted and ensuring that the connection is valid.  These do use PKI because it is appropriate server class technology and does not involve end users spending money to process DRM protected information.

Information publishers are effectively prevented from changing their identification because the licensing schemes bind the source of the information to the information publisher.

Preventing information being passed on

DRM technologies are used to prevent recipients from being able to pass on information that has been protected and stops them from being able to process it – see restricting and locking document access.  This can be very helpful in proving protected data could only have been disclosed to authorized users and that it cannot have been sold on.  CCPA states that “Consumers may bring a private right of action against Covered Businesses in connection with “certain unauthorized access and exfiltration, theft, or disclosure of a consumer’s nonencrypted or nonredacted personal information” if the Covered Business has failed to implement and maintain reasonable security measures to protect such information.”

The DRM approach is a simpler mechanism than trying to create a protection system that allows each authorized user of protected information from being able to grant that authority to someone new.  The idea has been around a while but could become a nightmare under data protection regulations or potential patent litigation.  It allows anyone to forward anything, which is not the plan of the regulators.

Stopping information being altered

DRM uses encryption to prevent unauthorised users from using protected information.  This has the additional benefit of meaning that forgery and misrepresentation become very difficult indeed – something that does not appear to have been addressed by IT regulations even though they are part of the criminal law.

But encryption only goes so far.  Once an authorized user has access to a document, DRM automatically prevents it from being modified since no edit functionality is made available.  As the document publisher you can also decide whether to allow annotations or not (markups and notes).

Preventing use outside of authorized locations

When sharing data with trusted third parties it can be important to control the locations in which sensitive and confidential data can be viewed.  This could be as broad as a country location or down to a specific office or building.

DRM can help enforce who sees information, from where and when, effectively controlling BYOD use.

Ceasing or revoking authorized access

DRM usually incorporates the ability to cease access to protected information – documents can be instantly revoked or revoked when a check with a licensing server has been scheduled.  This can be a valuable facility where it is believed that an authorized user has been compromised or is behaving improperly.

It can be very difficult to cease access using domain level controls and it is impractical to try and recall documents that may have been synchronised to several devices unless this DRM control has been implemented.

DRM can also be used to enforce automatic document expiry once data has reached the end of its life and should no longer be kept.

Logging document use

When dealing with sensitive information it can be important to know who used it, whether it was printed, and what date/time the information was accessed.  DRM can be used to retrieve and log all of this information for accountability purposes ensuring an accurate record is kept of access and use.  See tracking and logging document use.

Locklizard – protecting data from unauthorized use and misuse

Locklizard is a specialist DRM provider working for over 15 years on developing and providing high quality document security products that prevent protected information from being passed on or being misrepresented.  Safeguard PDF Security is a valuable tool that can be used to demonstrate compliance with regulation, and can be implemented today.

Personal information collectors and re-sellers still have to manage the administration and reporting requirements more recently introduced, but DRM technologies allow them to demonstrate that protected information cannot have been redistributed without their permission, and therefore they have taken adequate care of that information.

Tags: California Consumer Privacy Act, CCPA, data protection, digital rights management, document drm, document protection, document rights management, document security, document tracking, drm, drm security, gdpr data protection, personal data protection, protect confidential data, protect documents, protect sensitive data, protect sensitive personal data, protecting data, protecting documents, protecting personal data, protecting sensitive information, restrict document access, restrict document use, rights management
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Document Tracking and DRM Link to: Document Tracking and DRM Document Tracking and DRMLink to: Data Breaches & Document Security Link to: Data Breaches & Document Security Data Breaches & Document Security
Scroll to top Scroll to top Scroll to top