Which documents should be protected?

Defining sensitive documents to protect.

Surprisingly few organizations classify their information in order to help them protect it from unauthorized disclosure.  Usually improper disclosures get noticed when personal data are disclosed, and that can mean litigation involving a corporate authority and the public, and bags of adverse publicity. Read more

Revoke document access with DRM security

Document Revocation & Expiry.

Document revocation is an important step in the information architecture coming somewhere between security and disposal.  You can either revoke documents automatically using document expiry controls, or manually by suspending users, documents, or individual user access to specific document(s). Read more

Why lock documents to specific devices, countries, IPs?

Locking Documents for IPR control.

Although one of the primary requirements in PDF DRM (Digital Rights Management) is to identify the authorized user of a document, and make sure that only that person can use protected documents, it is relatively difficult to identify people, and although the IT industry has been working on improving the well out of date ID/Password combination, it is still in common use for flexibility of operation when better tools are available. Read more

Document Security Solutions – Encryption, DLP, ERM, IRM, DRM

Choosing the right Document Security.

Abraham Maslow said in 1966, “I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.”  And that is disturbingly true for most of us – especially product manufacturers who want to sell the security silver bullet (aka snake oil) to cure all ills.

So if you want to ‘secure’ a document, immediately four types of security vendor will be extolling their virtues and wares: Data Leakage Prevention (DLP), Encryption, Digital Rights Management (DRM) and Enterprise Rights Management (ERM) or Information Rights Management (IRM). Read more

DRM, Copyright Protection and the DMCA

DRM & the Protection of digital information.

Who says lightning never strikes twice in the same place?  They are wrong.  On the same day it is reported that HP have included new Digital Rights Management (DRM) in their printers to make them refuse to work with ‘foreign’ cartridges, and Claims are made that DRM restrictions lead customers to illegal activity.

Lest we forget, HP have had chips on their cartridges for some time now that decide when the cartridge is empty and if the new cartridge is ‘genuine’ but I’m not convinced by the argument that DRM is being used is correct. Read more