CAMS-Rights Management Flashcards
Defining Rights Management The Importance of a Rights Management Policy Consequences of Improper Rights Management Rights Management Best Practices
Defining Rights Management
The basic practice of rights management involves protecting sensitive data by assigning specific permissions to users within system.
The Importance of a Rights Management Policy
The ease with which information can be intercepted necessitates a rights management policy for every business and organization dealing with confidential data.
By defining permissions and managing access, businesses are able to
- Protect customer information
- Maintain security for BYOD policies
- Improve the security of 3rd parth and remote employee access
- Remain in compliance with current security regulations
Consequences of Improper Rights Management
Data breaches are the most damaging consequences for businesses failing to create effective rights management policies.
Accidental breaches caused by users within the system can have impacts of similar severity.
Data removed to 3rd party devices is subject to intentional theft or infection with malware. If reintroduced into the system, the malware may spread and result in additional data loss and destruction.
Rights Management Best Practices
Incorporating IRM strenghtens basic rights management.
IRM involves encrypting data wherever it goes, information is guarded against breaches resulting from accidental transfer.
Education is a key part of applying rights management policies within an organizations.
Put proper permissions in place reduces the risk of data breaches and keeps confidential information from leaving a system or being duplicated and leaked.
Digital Rights Management (DRM)
A larger application of rights management, often associated with the protections put on digital media like movies, music and electronic books.
Information Rights Management (IRM)
A subset of DRM used by businesses and enterprises to protect data. This approach to permissions is used to prevent the unauthorized sharing or theft of sensitive information and documents.
IRM can be used to govern both access to and distribution of data by making use of encryption algorithms and decryption keys.
IRM allow businesses and organizations to permit or prevent
- Copying
- Editing
- Forwarding
- Printing
- Saving
- Screen captures
- Transfer to external devices