165:
63:
22:
350:. IRM continues to protect and control access to the document when it is in use. Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution.
330:
Alternatively, an e-mail could be secured with IRM. If an email is accidentally forwarded to an untrusted party, only authorized users can gain access. A well designed IRM system will not limit the ability for information to be shared. Rules are enforced only when people attempt to gain access. This
260:
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies
293:
Once a document is encrypted against unauthorized users, an IRM user can apply certain access permissions that permit or deny a user from taking certain actions on a piece of information. Some of these standard permissions are included below.
331:
is important as often people share sensitive information with users who should legitimately have access but don't. Technology must facilitate control over sensitive information in such a situation.
327:
An example of IRM in use would be to secure a sensitive engineering document being distributed in an environment where the document's recipients could not necessarily be trusted.
80:
35:
426:
Herrera
Montano, Isabel; García Aranda, José Javier; Ramos Diaz, Juan; Molina Cardín, Sergio; de la Torre Díez, Isabel; Rodrigues, Joel J. P. C. (2022-07-14).
127:
99:
269:
IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.
257:
such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
498:
185:
41:
106:
221:
203:
146:
49:
468:
312:
Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
181:
113:
174:
84:
95:
401:
381:
250:
238:
241:(DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as
73:
120:
391:
315:
Full auditing of both access to documents as well as changes to the rights/policy by business users.
347:
299:
253:(DRM) technologies are typically associated with business-to-consumer systems designed to protect
319:
It also allows users to change or revoke access permissions without sharing the document again.
309:
A rights model/policy which allows for easy mapping of business classifications to information.
449:
439:
428:"Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat"
339:
282:
492:
386:
180:
It may require cleanup to comply with
Knowledge's content policies, particularly
343:
62:
444:
427:
396:
338:. Key management is used to protect the information whilst it is at rest on a
303:
278:
254:
453:
335:
358:
Information rights management is also known by the following names:
406:
281:
to prevent unauthorized access. A key or password can be used to
158:
56:
15:
365:
Enterprise DRM or
Enterprise Digital Rights Management
173:
A major contributor to this article appears to have a
87:. Unsourced material may be challenged and removed.
469:"Information Rights Management in Exchange Server"
298:Strong in use protection, such as controlling
8:
277:Information rights management solutions use
50:Learn how and when to remove these messages
334:IRM is far more secure than shared secret
443:
222:Learn how and when to remove this message
204:Learn how and when to remove this message
147:Learn how and when to remove this message
418:
249:. This can cause confusion, because
7:
247:Enterprise Digital Rights Management
85:adding citations to reliable sources
14:
31:This article has multiple issues.
261:mainly to documents and emails.
184:. Please discuss further on the
163:
61:
20:
96:"Information rights management"
72:needs additional citations for
39:or discuss these issues on the
1:
371:Intelligent Rights Management
235:Information rights management
402:Advanced Encryption Standard
362:Enterprise Rights Management
515:
445:10.1007/s10586-022-03668-2
368:Document Rights Management
499:Digital rights management
382:Digital rights management
251:digital rights management
239:digital rights management
285:to the encrypted data.
392:Copyright infringement
289:Permissions management
273:Information encryption
237:(IRM) is a subset of
182:neutral point of view
306:, printing, editing.
81:improve this article
467:JoanneHendrickson.
473:docs.microsoft.com
354:Naming conventions
432:Cluster Computing
232:
231:
224:
214:
213:
206:
177:with its subject.
157:
156:
149:
131:
54:
506:
483:
482:
480:
479:
464:
458:
457:
447:
438:(6): 4289–4302.
423:
300:copy & paste
227:
220:
209:
202:
198:
195:
189:
175:close connection
167:
166:
159:
152:
145:
141:
138:
132:
130:
89:
65:
57:
46:
24:
23:
16:
514:
513:
509:
508:
507:
505:
504:
503:
489:
488:
487:
486:
477:
475:
466:
465:
461:
425:
424:
420:
415:
378:
356:
325:
291:
275:
267:
228:
217:
216:
215:
210:
199:
193:
190:
179:
168:
164:
153:
142:
136:
133:
90:
88:
78:
66:
25:
21:
12:
11:
5:
512:
510:
502:
501:
491:
490:
485:
484:
459:
417:
416:
414:
411:
410:
409:
404:
399:
394:
389:
384:
377:
374:
373:
372:
369:
366:
363:
355:
352:
348:storage device
324:
321:
317:
316:
313:
310:
307:
290:
287:
283:control access
274:
271:
266:
263:
230:
229:
212:
211:
171:
169:
162:
155:
154:
69:
67:
60:
55:
29:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
511:
500:
497:
496:
494:
474:
470:
463:
460:
455:
451:
446:
441:
437:
433:
429:
422:
419:
412:
408:
405:
403:
400:
398:
395:
393:
390:
388:
387:Always-on DRM
385:
383:
380:
379:
375:
370:
367:
364:
361:
360:
359:
353:
351:
349:
345:
344:network drive
341:
337:
332:
328:
322:
320:
314:
311:
308:
305:
302:, preventing
301:
297:
296:
295:
288:
286:
284:
280:
272:
270:
264:
262:
258:
256:
252:
248:
244:
240:
236:
226:
223:
208:
205:
197:
187:
183:
178:
176:
170:
161:
160:
151:
148:
140:
129:
126:
122:
119:
115:
112:
108:
105:
101:
98: –
97:
93:
92:Find sources:
86:
82:
76:
75:
70:This article
68:
64:
59:
58:
53:
51:
44:
43:
38:
37:
32:
27:
18:
17:
476:. Retrieved
472:
462:
435:
431:
421:
357:
333:
329:
326:
318:
292:
276:
268:
259:
246:
242:
234:
233:
218:
200:
191:
172:
143:
134:
124:
117:
110:
103:
91:
79:Please help
74:verification
71:
47:
40:
34:
33:Please help
30:
304:screenshots
194:August 2013
478:2022-07-22
413:References
397:Encryption
279:encryption
255:rich media
107:newspapers
36:improve it
454:1573-7543
346:or other
340:hard disk
336:passwords
186:talk page
137:July 2022
42:talk page
493:Category
376:See also
323:Examples
265:Features
121:scholar
452:
123:
116:
109:
102:
94:
407:Rpmsg
243:E-DRM
128:JSTOR
114:books
450:ISSN
100:news
440:doi
245:or
83:by
495::
471:.
448:.
436:25
434:.
430:.
342:,
45:.
481:.
456:.
442::
225:)
219:(
207:)
201:(
196:)
192:(
188:.
150:)
144:(
139:)
135:(
125:·
118:·
111:·
104:·
77:.
52:)
48:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.