Compliance – Securing Sensitive Information
Compliance Requirements and document security
Business process compliance
Locklizard document DRM can help with all process compliance requirements. You can use our document security to ensure that only those authorized can view information and prove that it cannot have been seen or used by anyone else. So you can prove that your business processes are sound and secure – better than relying on encryption where once information has been decrypted the user can distribute it to anyone they want.
Information access compliance
You can demonstrate who actually registered to read information, and who did not, even if they were authorized to read it through document security and document controls. And if it is necessary you can prove when they read specific documents, and the location they were at when the documents were accessed. Also if any of the documents were printed that can be monitored and logged.
Ensuring information becomes inaccessible
In many circumstances you are only legally required to maintain information for a specific time period (commonly 6 or 7 years) and after that you may destroy information after that time. It can be very important for you to be certain that information will become destroyed at the actual time, and not be capable of recovery from backups or personal copies. Locklizard document DRM allows you to set an end date by document, so you can be certain that from that end date the document is inaccessible, and effectively destroyed. For further reading see document retention.
Since Locklizard document security uses the best available encryption methods you can be sure that your protected documents cannot be accessed by anyone who is not authorized. Authorized users do not have the ability to pass on their authority to others, so lines of accountability are clear and precise. Our document security products can be readily used to support the open use of corporate information both inside and outside the corporate network whilst preventing outsiders from being able to access information – even when it is held on a laptop or mobile device.
Control of availability of documents
You may need to be able to prove that documents could not have been used before a given date (SEC reports, analyst briefings, formal reports to statutory bodies). Locklizard document DRM can control access so that they cannot be seen before the date on which they are authorized.
Controlling legal access
You may need to provide access to privileged documents to lawyers or other investigators as part of the legal process known as discovery, or because you need to provide documents to your own advisers. You want to be sure that only documents that you have authorized can be used and be able to know which parties have used them. This is an ideal way of being sure that others can only gain access to specifically authorized information and cannot go on ‘fishing trips’ through your information. It also allows you to comply with the NIST SP 800-171 rules concerning controlled access to information. You can set an expiry date for information and instantly revoke access when needed.