176:
74:
33:
361:. IRM continues to protect and control access to the document when it is in use. Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution.
341:
Alternatively, an e-mail could be secured with IRM. If an email is accidentally forwarded to an untrusted party, only authorized users can gain access. A well designed IRM system will not limit the ability for information to be shared. Rules are enforced only when people attempt to gain access. This
271:
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies
304:
Once a document is encrypted against unauthorized users, an IRM user can apply certain access permissions that permit or deny a user from taking certain actions on a piece of information. Some of these standard permissions are included below.
342:
is important as often people share sensitive information with users who should legitimately have access but don't. Technology must facilitate control over sensitive information in such a situation.
338:
An example of IRM in use would be to secure a sensitive engineering document being distributed in an environment where the document's recipients could not necessarily be trusted.
91:
46:
437:
Herrera
Montano, Isabel; García Aranda, José Javier; Ramos Diaz, Juan; Molina Cardín, Sergio; de la Torre Díez, Isabel; Rodrigues, Joel J. P. C. (2022-07-14).
138:
110:
280:
IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.
268:
such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
509:
196:
52:
192:
117:
232:
214:
157:
60:
185:
479:
323:
Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
124:
95:
106:
412:
84:
392:
261:
249:
252:(DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as
131:
402:
326:
Full auditing of both access to documents as well as changes to the rights/policy by business users.
358:
310:
264:(DRM) technologies are typically associated with business-to-consumer systems designed to protect
330:
It also allows users to change or revoke access permissions without sharing the document again.
320:
A rights model/policy which allows for easy mapping of business classifications to information.
460:
17:
450:
439:"Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat"
350:
293:
191:
It may require cleanup to comply with
Knowledge (XXG)'s content policies, particularly
503:
397:
354:
73:
455:
438:
407:
349:. Key management is used to protect the information whilst it is at rest on a
314:
289:
265:
464:
346:
369:
Information rights management is also known by the following names:
417:
292:
to prevent unauthorized access. A key or password can be used to
169:
67:
26:
376:
Enterprise DRM or
Enterprise Digital Rights Management
184:
A major contributor to this article appears to have a
98:. Unsourced material may be challenged and removed.
480:"Information Rights Management in Exchange Server"
309:Strong in use protection, such as controlling
8:
288:Information rights management solutions use
61:Learn how and when to remove these messages
345:IRM is far more secure than shared secret
454:
233:Learn how and when to remove this message
215:Learn how and when to remove this message
158:Learn how and when to remove this message
429:
260:. This can cause confusion, because
7:
258:Enterprise Digital Rights Management
96:adding citations to reliable sources
25:
42:This article has multiple issues.
272:mainly to documents and emails.
195:. Please discuss further on the
174:
72:
31:
107:"Information rights management"
83:needs additional citations for
50:or discuss these issues on the
1:
382:Intelligent Rights Management
246:Information rights management
18:Information Rights Management
413:Advanced Encryption Standard
373:Enterprise Rights Management
526:
456:10.1007/s10586-022-03668-2
379:Document Rights Management
510:Digital rights management
393:Digital rights management
262:digital rights management
250:digital rights management
296:to the encrypted data.
403:Copyright infringement
300:Permissions management
284:Information encryption
248:(IRM) is a subset of
193:neutral point of view
317:, printing, editing.
92:improve this article
478:JoanneHendrickson.
484:docs.microsoft.com
365:Naming conventions
443:Cluster Computing
243:
242:
235:
225:
224:
217:
188:with its subject.
168:
167:
160:
142:
65:
16:(Redirected from
517:
494:
493:
491:
490:
475:
469:
468:
458:
449:(6): 4289–4302.
434:
311:copy & paste
238:
231:
220:
213:
209:
206:
200:
186:close connection
178:
177:
170:
163:
156:
152:
149:
143:
141:
100:
76:
68:
57:
35:
34:
27:
21:
525:
524:
520:
519:
518:
516:
515:
514:
500:
499:
498:
497:
488:
486:
477:
476:
472:
436:
435:
431:
426:
389:
367:
336:
302:
286:
278:
239:
228:
227:
226:
221:
210:
204:
201:
190:
179:
175:
164:
153:
147:
144:
101:
99:
89:
77:
36:
32:
23:
22:
15:
12:
11:
5:
523:
521:
513:
512:
502:
501:
496:
495:
470:
428:
427:
425:
422:
421:
420:
415:
410:
405:
400:
395:
388:
385:
384:
383:
380:
377:
374:
366:
363:
359:storage device
335:
332:
328:
327:
324:
321:
318:
301:
298:
294:control access
285:
282:
277:
274:
241:
240:
223:
222:
182:
180:
173:
166:
165:
80:
78:
71:
66:
40:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
522:
511:
508:
507:
505:
485:
481:
474:
471:
466:
462:
457:
452:
448:
444:
440:
433:
430:
423:
419:
416:
414:
411:
409:
406:
404:
401:
399:
398:Always-on DRM
396:
394:
391:
390:
386:
381:
378:
375:
372:
371:
370:
364:
362:
360:
356:
355:network drive
352:
348:
343:
339:
333:
331:
325:
322:
319:
316:
313:, preventing
312:
308:
307:
306:
299:
297:
295:
291:
283:
281:
275:
273:
269:
267:
263:
259:
255:
251:
247:
237:
234:
219:
216:
208:
198:
194:
189:
187:
181:
172:
171:
162:
159:
151:
140:
137:
133:
130:
126:
123:
119:
116:
112:
109: –
108:
104:
103:Find sources:
97:
93:
87:
86:
81:This article
79:
75:
70:
69:
64:
62:
55:
54:
49:
48:
43:
38:
29:
28:
19:
487:. Retrieved
483:
473:
446:
442:
432:
368:
344:
340:
337:
329:
303:
287:
279:
270:
257:
253:
245:
244:
229:
211:
202:
183:
154:
145:
135:
128:
121:
114:
102:
90:Please help
85:verification
82:
58:
51:
45:
44:Please help
41:
315:screenshots
205:August 2013
489:2022-07-22
424:References
408:Encryption
290:encryption
266:rich media
118:newspapers
47:improve it
465:1573-7543
357:or other
351:hard disk
347:passwords
197:talk page
148:July 2022
53:talk page
504:Category
387:See also
334:Examples
276:Features
132:scholar
463:
134:
127:
120:
113:
105:
418:Rpmsg
254:E-DRM
139:JSTOR
125:books
461:ISSN
111:news
451:doi
256:or
94:by
506::
482:.
459:.
447:25
445:.
441:.
353:,
56:.
492:.
467:.
453::
236:)
230:(
218:)
212:(
207:)
203:(
199:.
161:)
155:(
150:)
146:(
136:·
129:·
122:·
115:·
88:.
63:)
59:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.