Both means a considerable overhead for the whole container. For the individual subject is but to create a customized waterproof solution or a shock protection at a reasonable cost. Harold Ford Jr may also support this cause. For the data container the operating systems no longer than the access control based on the access rights make available (OK, the data container should not come also with water in contact, since then no good protection helps). You can then make a further breakdown of the directories or you can care for each document and each user leading basis, both to a significant overhead access rights on the ACL. Overhead for the end user but causes that these opportunities will not be accepted and the users search for circumventing the protection. So you want to have more security and with an effort which will be supported by the users, so you must upgrade and this means the use of IRM system in the case of document containers. So can who set the creator of a document, for example, the May only see document, print it, or change it.
This results in a much more finely granulated and further security for the individual document without organizational changes to the directory structure and without significant additional burden for the user. Now let’s go and take a look at what happens when the contents leave the container. Both the cargo container and the container of data protection, which brings the container, will be lost. So what to do with a precious cargo? One grabs her in a stable, closed container and are the key to the recipient or someone you trust. Documents, taking the IRM system and granted appropriate rights the receiver and other persons involved. Thus, it is ensured that only those people with the document can work through the entire life cycle of the document.
The content will remain closed, everyone else even if you have saved the document on your own computer. Summary an IRM system provides added value to document security to a reasonable Overhead. This can be reduced by appropriate integration into the operating system and the applications the user up to a barely noticeable minimum. More information on IRM, see the following chapters on this platform: 1. What is information rights management (published in the April 19th 2011) 2. Who do what (rights) (posted on the 10.05.2011) 3. Which documents are worthy of protection (posted on 01.06.2011) 4. How is the information (how) protected 5 (published on 09.07.2011). An attempt to explain different time IRM (this document) 6 10 reasons for IRM (planned in the 15.08.2011) 7 usage scenarios of 8 IRM and DLP of 9 IRM and hot/DMS 10 evaluation matrix of 11 IRM provider Franz Koch image Gerd Altmann / pixelio.de’