Information Rights Management

Information Rights Management

"'Information Rights Management(IRM) is a term that applies to a technology which protects sensitive information from unauthorised access. It is sometimes referred to as E-DRM, Enterprise Digital Rights Management. This can cause confusion because Digital Restrictions Management (DRM) technologies are typically associated with business to consumer systems designed to protect rich media such as music and video. Some existing IRM systems have been ongoing development of DRM style systems, however a true IRM system will have some important differences and is typically used to protect information in a business to business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails.

The future of IRM lies in providing a security rights model which can be applied to any type of information, be it in documents, emails, a database or even the rights to access network resources.

IRM technologies allow for several levels of security but most offer complete control to information throughout its entire life cycle. Functionality offered by IRM usually encompasses;

  • Industry standard encryption of the information.
  • Strong in use protection, such as controlling copy & paste, preventing screen shots and printing.
  • A rights model/policy which allows for easy mapping of business classifications to information.
  • Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
  • Full auditing of both access to documents as well as changes to the rights/policy by business users

An example of IRM in use would be to secure a sensitive engineering document being distributed in an environment where the document's recipients could not necessarily be trusted. Alternatively, an e-mail could be secured with IRM, so if it accidentally is forwarded to an untrusted party, only authorised users would gain access. Note that a well designed IRM system will not limit the ability for information to be shared, rather rules are only enforced when people attempt to gain access. This is important as often people share sensitive information with users who should legitimately have access but don't, and the technology needs to facilite the easy request of access back to the business owners.

IRM is far more secure than passwords, encryption is used to protect the information whilst it is at rest on a hard disk, network drive or other storage device. Crucially IRM continues to protect and control access to the document when it is in use. Functionality such as preventing screen shots, disallowing the copying of data from the secure document to an insecure environment and guarding the information from programmatic attack, are key elements of an effective IRM solution.


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Information Right Management — Sommaire 1 IRM : Périmètre 2 IRM dans l espace 3 IRM dans le temps 4 Les solutions 5 …   Wikipédia en Français

  • Rights Management System — Les Rights Management Services sont une technique développée par Microsoft. Ils sont semblables aux DRM, et visent donc à gérer, pour un fichier donné, les droits accordés à l utilisateur par son créateur. Sommaire 1 Définitions 2 Introduction 3… …   Wikipédia en Français

  • Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses …   Wikipedia

  • Digital Rights Management — Digitale Rechteverwaltung (gelegentlich auch Digitales Rechtemanagement bzw. engl. Digital Rights Management oder kurz DRM) bezeichnet Verfahren, mit denen die Nutzung (und Verbreitung) digitaler Medien kontrolliert werden soll. Vor allem bei… …   Deutsch Wikipedia

  • Rights Management Services — Windows Rights Management Services (also called Rights Management Services or RMS) is a Microsoft Windows technology that is a form of digital restrictions management used for protecting documents such as corporate e mail, Word documents, and web …   Wikipedia

  • Digital Rights Management — Gestion des droits numériques Pour les articles homonymes, voir DRM. La gestion des droits numériques ou GDN[1] (en anglais Digital Rights Management DRM) a pour objectif de contrôler l utilisation qui est faite des œuvres numériques, par des… …   Wikipédia en Français

  • Digital rights management — Gestion des droits numériques Pour les articles homonymes, voir DRM. La gestion des droits numériques ou GDN[1] (en anglais Digital Rights Management DRM) a pour objectif de contrôler l utilisation qui est faite des œuvres numériques, par des… …   Wikipédia en Français

  • digital rights management — n. The practice of restricting access to digital materials and information by copyright holders and publishers. abbrv. DRM The Essential Law Dictionary. Sphinx Publishing, An imprint of Sourcebooks, Inc. Amy Hackney Blackwell. 2008 …   Law dictionary

  • Information technology governance — Information Technology Governance, IT Governance or ICT (Information Communications Technology) Governance, is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management.… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”