Cyber Security Expo
 
Enterprise Rights Management (ERM): Architectural Approaches by Avoco Secure on 29/01/07

One of the prime features of electronic documents is their ease of movement. They can be passed from one person to another not just to share and disseminate information but also to collaborate on that information. This key attribute of electronic documents gives them the technological edge over paper supporting the ultimate goal of the ‘paperless office’.

In contradiction to this freedom of movement, is a need to control document content and ensure that it does not get into the wrong hands or is used illegitimately. Enterprise rights management systems (ERM) attempt to combat this data leakage by going a step beyond encryption and adding controls to the use of the content of a document (not just protecting the file itself). However, the way that an ERM system approaches this task is vital in retaining the fluid communication characteristic of electronic documents.

If the system in any way reduces or removes the inherent fluidity of a document, then this vital feature of free-flowing movement will be lost.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.