Knowledge

Information rights management

Source 📝

165: 63: 22: 350:. IRM continues to protect and control access to the document when it is in use. Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution. 330:
Alternatively, an e-mail could be secured with IRM. If an email is accidentally forwarded to an untrusted party, only authorized users can gain access. A well designed IRM system will not limit the ability for information to be shared. Rules are enforced only when people attempt to gain access. This
260:
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies
293:
Once a document is encrypted against unauthorized users, an IRM user can apply certain access permissions that permit or deny a user from taking certain actions on a piece of information. Some of these standard permissions are included below.
331:
is important as often people share sensitive information with users who should legitimately have access but don't. Technology must facilitate control over sensitive information in such a situation.
327:
An example of IRM in use would be to secure a sensitive engineering document being distributed in an environment where the document's recipients could not necessarily be trusted.
80: 35: 426:
Herrera Montano, Isabel; García Aranda, José Javier; Ramos Diaz, Juan; Molina Cardín, Sergio; de la Torre Díez, Isabel; Rodrigues, Joel J. P. C. (2022-07-14).
127: 99: 269:
IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.
257:
such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
498: 185: 41: 106: 221: 203: 146: 49: 468: 312:
Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
181: 113: 174: 84: 95: 401: 381: 250: 238: 241:(DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as 73: 120: 391: 315:
Full auditing of both access to documents as well as changes to the rights/policy by business users.
347: 299: 253:(DRM) technologies are typically associated with business-to-consumer systems designed to protect 319:
It also allows users to change or revoke access permissions without sharing the document again.
309:
A rights model/policy which allows for easy mapping of business classifications to information.
449: 439: 428:"Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat" 339: 282: 492: 386: 180:
It may require cleanup to comply with Knowledge's content policies, particularly
343: 62: 444: 427: 396: 338:. Key management is used to protect the information whilst it is at rest on a 303: 278: 254: 453: 335: 358:
Information rights management is also known by the following names:
406: 281:
to prevent unauthorized access. A key or password can be used to
158: 56: 15: 365:
Enterprise DRM or Enterprise Digital Rights Management
173:
A major contributor to this article appears to have a
87:. Unsourced material may be challenged and removed. 469:"Information Rights Management in Exchange Server" 298:Strong in use protection, such as controlling 8: 277:Information rights management solutions use 50:Learn how and when to remove these messages 334:IRM is far more secure than shared secret 443: 222:Learn how and when to remove this message 204:Learn how and when to remove this message 147:Learn how and when to remove this message 418: 249:. This can cause confusion, because 7: 247:Enterprise Digital Rights Management 85:adding citations to reliable sources 14: 31:This article has multiple issues. 261:mainly to documents and emails. 184:. Please discuss further on the 163: 61: 20: 96:"Information rights management" 72:needs additional citations for 39:or discuss these issues on the 1: 371:Intelligent Rights Management 235:Information rights management 402:Advanced Encryption Standard 362:Enterprise Rights Management 515: 445:10.1007/s10586-022-03668-2 368:Document Rights Management 499:Digital rights management 382:Digital rights management 251:digital rights management 239:digital rights management 285:to the encrypted data. 392:Copyright infringement 289:Permissions management 273:Information encryption 237:(IRM) is a subset of 182:neutral point of view 306:, printing, editing. 81:improve this article 467:JoanneHendrickson. 473:docs.microsoft.com 354:Naming conventions 432:Cluster Computing 232: 231: 224: 214: 213: 206: 177:with its subject. 157: 156: 149: 131: 54: 506: 483: 482: 480: 479: 464: 458: 457: 447: 438:(6): 4289–4302. 423: 300:copy & paste 227: 220: 209: 202: 198: 195: 189: 175:close connection 167: 166: 159: 152: 145: 141: 138: 132: 130: 89: 65: 57: 46: 24: 23: 16: 514: 513: 509: 508: 507: 505: 504: 503: 489: 488: 487: 486: 477: 475: 466: 465: 461: 425: 424: 420: 415: 378: 356: 325: 291: 275: 267: 228: 217: 216: 215: 210: 199: 193: 190: 179: 168: 164: 153: 142: 136: 133: 90: 88: 78: 66: 25: 21: 12: 11: 5: 512: 510: 502: 501: 491: 490: 485: 484: 459: 417: 416: 414: 411: 410: 409: 404: 399: 394: 389: 384: 377: 374: 373: 372: 369: 366: 363: 355: 352: 348:storage device 324: 321: 317: 316: 313: 310: 307: 290: 287: 283:control access 274: 271: 266: 263: 230: 229: 212: 211: 171: 169: 162: 155: 154: 69: 67: 60: 55: 29: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 511: 500: 497: 496: 494: 474: 470: 463: 460: 455: 451: 446: 441: 437: 433: 429: 422: 419: 412: 408: 405: 403: 400: 398: 395: 393: 390: 388: 387:Always-on DRM 385: 383: 380: 379: 375: 370: 367: 364: 361: 360: 359: 353: 351: 349: 345: 344:network drive 341: 337: 332: 328: 322: 320: 314: 311: 308: 305: 302:, preventing 301: 297: 296: 295: 288: 286: 284: 280: 272: 270: 264: 262: 258: 256: 252: 248: 244: 240: 236: 226: 223: 208: 205: 197: 187: 183: 178: 176: 170: 161: 160: 151: 148: 140: 129: 126: 122: 119: 115: 112: 108: 105: 101: 98: –  97: 93: 92:Find sources: 86: 82: 76: 75: 70:This article 68: 64: 59: 58: 53: 51: 44: 43: 38: 37: 32: 27: 18: 17: 476:. Retrieved 472: 462: 435: 431: 421: 357: 333: 329: 326: 318: 292: 276: 268: 259: 246: 242: 234: 233: 218: 200: 191: 172: 143: 134: 124: 117: 110: 103: 91: 79:Please help 74:verification 71: 47: 40: 34: 33:Please help 30: 304:screenshots 194:August 2013 478:2022-07-22 413:References 397:Encryption 279:encryption 255:rich media 107:newspapers 36:improve it 454:1573-7543 346:or other 340:hard disk 336:passwords 186:talk page 137:July 2022 42:talk page 493:Category 376:See also 323:Examples 265:Features 121:scholar 452:  123:  116:  109:  102:  94:  407:Rpmsg 243:E-DRM 128:JSTOR 114:books 450:ISSN 100:news 440:doi 245:or 83:by 495:: 471:. 448:. 436:25 434:. 430:. 342:, 45:. 481:. 456:. 442:: 225:) 219:( 207:) 201:( 196:) 192:( 188:. 150:) 144:( 139:) 135:( 125:· 118:· 111:· 104:· 77:. 52:) 48:(

Index

improve it
talk page
Learn how and when to remove these messages

verification
improve this article
adding citations to reliable sources
"Information rights management"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
close connection
neutral point of view
talk page
Learn how and when to remove this message
Learn how and when to remove this message
digital rights management
digital rights management
rich media
encryption
control access
copy & paste
screenshots
passwords
hard disk
network drive
storage device

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.