Knowledge (XXG)

Information rights management

Source 📝

176: 74: 33: 361:. IRM continues to protect and control access to the document when it is in use. Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution. 341:
Alternatively, an e-mail could be secured with IRM. If an email is accidentally forwarded to an untrusted party, only authorized users can gain access. A well designed IRM system will not limit the ability for information to be shared. Rules are enforced only when people attempt to gain access. This
271:
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies
304:
Once a document is encrypted against unauthorized users, an IRM user can apply certain access permissions that permit or deny a user from taking certain actions on a piece of information. Some of these standard permissions are included below.
342:
is important as often people share sensitive information with users who should legitimately have access but don't. Technology must facilitate control over sensitive information in such a situation.
338:
An example of IRM in use would be to secure a sensitive engineering document being distributed in an environment where the document's recipients could not necessarily be trusted.
91: 46: 437:
Herrera Montano, Isabel; García Aranda, José Javier; Ramos Diaz, Juan; Molina Cardín, Sergio; de la Torre Díez, Isabel; Rodrigues, Joel J. P. C. (2022-07-14).
138: 110: 280:
IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.
268:
such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
509: 196: 52: 192: 117: 232: 214: 157: 60: 185: 479: 323:
Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
124: 95: 106: 412: 84: 392: 261: 249: 252:(DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as 131: 402: 326:
Full auditing of both access to documents as well as changes to the rights/policy by business users.
358: 310: 264:(DRM) technologies are typically associated with business-to-consumer systems designed to protect 330:
It also allows users to change or revoke access permissions without sharing the document again.
320:
A rights model/policy which allows for easy mapping of business classifications to information.
460: 17: 450: 439:"Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat" 350: 293: 191:
It may require cleanup to comply with Knowledge (XXG)'s content policies, particularly
503: 397: 354: 73: 455: 438: 407: 349:. Key management is used to protect the information whilst it is at rest on a 314: 289: 265: 464: 346: 369:
Information rights management is also known by the following names:
417: 292:
to prevent unauthorized access. A key or password can be used to
169: 67: 26: 376:
Enterprise DRM or Enterprise Digital Rights Management
184:
A major contributor to this article appears to have a
98:. Unsourced material may be challenged and removed. 480:"Information Rights Management in Exchange Server" 309:Strong in use protection, such as controlling 8: 288:Information rights management solutions use 61:Learn how and when to remove these messages 345:IRM is far more secure than shared secret 454: 233:Learn how and when to remove this message 215:Learn how and when to remove this message 158:Learn how and when to remove this message 429: 260:. This can cause confusion, because 7: 258:Enterprise Digital Rights Management 96:adding citations to reliable sources 25: 42:This article has multiple issues. 272:mainly to documents and emails. 195:. Please discuss further on the 174: 72: 31: 107:"Information rights management" 83:needs additional citations for 50:or discuss these issues on the 1: 382:Intelligent Rights Management 246:Information rights management 18:Information Rights Management 413:Advanced Encryption Standard 373:Enterprise Rights Management 526: 456:10.1007/s10586-022-03668-2 379:Document Rights Management 510:Digital rights management 393:Digital rights management 262:digital rights management 250:digital rights management 296:to the encrypted data. 403:Copyright infringement 300:Permissions management 284:Information encryption 248:(IRM) is a subset of 193:neutral point of view 317:, printing, editing. 92:improve this article 478:JoanneHendrickson. 484:docs.microsoft.com 365:Naming conventions 443:Cluster Computing 243: 242: 235: 225: 224: 217: 188:with its subject. 168: 167: 160: 142: 65: 16:(Redirected from 517: 494: 493: 491: 490: 475: 469: 468: 458: 449:(6): 4289–4302. 434: 311:copy & paste 238: 231: 220: 213: 209: 206: 200: 186:close connection 178: 177: 170: 163: 156: 152: 149: 143: 141: 100: 76: 68: 57: 35: 34: 27: 21: 525: 524: 520: 519: 518: 516: 515: 514: 500: 499: 498: 497: 488: 486: 477: 476: 472: 436: 435: 431: 426: 389: 367: 336: 302: 286: 278: 239: 228: 227: 226: 221: 210: 204: 201: 190: 179: 175: 164: 153: 147: 144: 101: 99: 89: 77: 36: 32: 23: 22: 15: 12: 11: 5: 523: 521: 513: 512: 502: 501: 496: 495: 470: 428: 427: 425: 422: 421: 420: 415: 410: 405: 400: 395: 388: 385: 384: 383: 380: 377: 374: 366: 363: 359:storage device 335: 332: 328: 327: 324: 321: 318: 301: 298: 294:control access 285: 282: 277: 274: 241: 240: 223: 222: 182: 180: 173: 166: 165: 80: 78: 71: 66: 40: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 522: 511: 508: 507: 505: 485: 481: 474: 471: 466: 462: 457: 452: 448: 444: 440: 433: 430: 423: 419: 416: 414: 411: 409: 406: 404: 401: 399: 398:Always-on DRM 396: 394: 391: 390: 386: 381: 378: 375: 372: 371: 370: 364: 362: 360: 356: 355:network drive 352: 348: 343: 339: 333: 331: 325: 322: 319: 316: 313:, preventing 312: 308: 307: 306: 299: 297: 295: 291: 283: 281: 275: 273: 269: 267: 263: 259: 255: 251: 247: 237: 234: 219: 216: 208: 198: 194: 189: 187: 181: 172: 171: 162: 159: 151: 140: 137: 133: 130: 126: 123: 119: 116: 112: 109: –  108: 104: 103:Find sources: 97: 93: 87: 86: 81:This article 79: 75: 70: 69: 64: 62: 55: 54: 49: 48: 43: 38: 29: 28: 19: 487:. Retrieved 483: 473: 446: 442: 432: 368: 344: 340: 337: 329: 303: 287: 279: 270: 257: 253: 245: 244: 229: 211: 202: 183: 154: 145: 135: 128: 121: 114: 102: 90:Please help 85:verification 82: 58: 51: 45: 44:Please help 41: 315:screenshots 205:August 2013 489:2022-07-22 424:References 408:Encryption 290:encryption 266:rich media 118:newspapers 47:improve it 465:1573-7543 357:or other 351:hard disk 347:passwords 197:talk page 148:July 2022 53:talk page 504:Category 387:See also 334:Examples 276:Features 132:scholar 463:  134:  127:  120:  113:  105:  418:Rpmsg 254:E-DRM 139:JSTOR 125:books 461:ISSN 111:news 451:doi 256:or 94:by 506:: 482:. 459:. 447:25 445:. 441:. 353:, 56:. 492:. 467:. 453:: 236:) 230:( 218:) 212:( 207:) 203:( 199:. 161:) 155:( 150:) 146:( 136:· 129:· 122:· 115:· 88:. 63:) 59:( 20:)

Index

Information Rights Management
improve it
talk page
Learn how and when to remove these messages

verification
improve this article
adding citations to reliable sources
"Information rights management"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
close connection
neutral point of view
talk page
Learn how and when to remove this message
Learn how and when to remove this message
digital rights management
digital rights management
rich media
encryption
control access
copy & paste
screenshots
passwords
hard disk
network drive

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.