Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
IRM: Key To Information Control
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • IRM: Key To Information Control

IRM: Key To Information Control

Vishal Dhupar • April 16, 2009, 11:32:15 IST
Whatsapp Facebook Twitter

Information Rights Management or IRM allows for information (mostly in the form of documents) to be ‘remote controlled’.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
On
Google
Prefer
Firstpost
IRM: Key To Information Control

Have you ever felt the need to ‘recall’ information that you have sent to other people?

Are you worried about employees with access to confidential information leaving with the information?

Do you really know what happens to confidential information after it is distributed?

Have you visited any website publishing leaked documents recently and checked if your internal documents or memos are there?

Well, let us explore the answers to some of these questions.

The Internet and computers have allowed unprecedented collaboration within and amongst enterprises. Collaboration, however, comes with issues of privacy and security i.e. the more you share, the more you expose yourself to information leakage and theft.

STORY CONTINUES BELOW THIS AD

So does this mean that you can’t collaborate or share confidential information? How can R&D organisations share research data without worrying about leakage? How about board communication before it becomes public?

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Enter Information Rights Management or IRM – a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.

Let us look at an example here.

As of now… If Maya sends a document to John for review, then John has complete control over the document after he receives it i.e. he can view it, print it, forward it, make copies etc. In effect, Maya loses all control over the document as soon as it is distributed. There are, of course, legal mechanisms to control usage like Non-Disclosure Agreements, but we all know how effective they are.

With IRM technology… If Maya sends a document to John for review, she retains ‘ownership’ of the document i.e. she can still control

1. Who (in this case only John) can use the document
2. What (in this case view and perhaps edit but not print, distribute or make copies) can he do
3. When (from March 2 to 15) can he do this and
4. Where (only in the office) can he access the document from

Not only this, Maya can change these permissions (or ‘rights’) in case she changes her mind later. She can adjust her permissions so that John can view the document and perhaps now print it but not edit it anymore.

IRM technology allows for the fine distinction between use and misuse. There are two primary reasons for using an IRM technology, which are listed below.

STORY CONTINUES BELOW THIS AD

Security

IRM technology provides security of information, no matter where it is located. Thus, organisation security policies can be implemented irrespective of the location of the information. This is a boon for CISOs of large organisations. Typical scenarios where IRM comes handy are:

- Information shared with a potential acquirer during the process of an M&A transaction
- R&D information in the form of process, drawings, test results etc
- Information received from customers under an NDA
- Information shared with vendors for the purpose of outsourcing of business processes like data entry and printing

Compliance

Most regulatory compliance frameworks like ISO-27001, Sarbanes Oxley, HIPAA, and GLBA etc have recommendations on specific controls that need to be put in place.

Choosing the Right IRM Technology

There are quite a few factors for selection of an IRM technology. For CIOs and CISOs of mid- to large-sized organisations, some of the important factors to be kept in mind are:

- Formats and features: Support for common and not-so-common document formats including open source (open office) and engineering drawing (AutoCAD) formats, security within and outside of the organisation, audit tracking authorised and unauthorised events, etc.

STORY CONTINUES BELOW THIS AD

- Security: Granular definition of rights (who, what, when and where), prevention of screen grabbing and screen sharing tools, strong and industry-standard encryption algorithms etc.

- Ease of use and administration: Internal and third-party authentication, document- and folder-based rights, centralised policy definition along with separation of duties, support for remote deployment, support for virtualised environments etc.

Being an emerging technology, there are very few companies providing IRM technologies. In India, Seclore (www.seclore.com ), an IIT Bombay promoted company, has been providing IRM systems largely to financial services and engineering companies.

Conclusion

IRM technology is slowly becoming one of the default infrastructures for security in an organisation. Adoption of this technology needs to done in phases starting from the source of confidential information and moving on to the usage.

Gupta is director of Seclore Technology, India.

STORY CONTINUES BELOW THIS AD
Tags
Technology Security Compliance Seclore Technology BizTech News IRM Information Rights Management Vishal Gupta
End of Article
Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV